, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0xfdffffff, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1842.920983] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1842.932168] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1842.942450] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1842.951009] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:14 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x2300, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:14 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1842.968655] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1842.980298] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1842.992721] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:14 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1843.074190] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:14 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x3000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1843.153979] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0xfffffdfd, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:14 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x6000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1843.225664] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.262577] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.290205] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.323664] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.387843] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.428359] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:15 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x7000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:15 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:15 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x3f00, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:15 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x7000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:15 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0xfffffffd, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1843.789189] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.806901] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.809274] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.826648] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:15 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x6000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1843.835486] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.852296] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.862047] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:15 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:15 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x7fffffe, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:15 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1843.972992] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.032934] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x100000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1844.081612] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.084066] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:15 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x8800, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1844.139066] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.165438] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:15 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x8000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:15 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1844.198789] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:15 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x11000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1844.260323] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.286751] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1844.329862] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.346914] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x1000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1844.392120] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x200000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:16 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1844.435880] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.468081] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x23000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1844.519914] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.558769] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1844.633333] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.643790] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x2000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1844.725957] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.756016] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x3000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:16 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1844.781506] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.870987] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.908955] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.951745] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.992075] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x9000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:16 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x30000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x300000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:16 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:16 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:16 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x4000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1845.261368] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.262771] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.276045] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.281686] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.321688] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.330303] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.335332] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:17 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:17 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x5000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:17 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x88000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1845.463575] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.509847] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.522070] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:17 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:17 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x6000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:17 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1845.556028] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.641602] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.690849] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.701757] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.713969] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.748491] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.760046] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:17 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xa000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x400000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:17 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0xfeffff07, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:17 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:17 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x7000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:17 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1846.073801] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.079812] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.097337] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.111654] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.136617] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.149726] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:17 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:17 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x7fffffe, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:17 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:17 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x100000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1846.332870] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.336012] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.356787] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x500000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1846.375669] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.401846] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.410505] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x11000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1846.439866] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xb000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:18 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x200000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:18 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:18 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1846.567204] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x20000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1846.665369] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.677388] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.695372] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x600000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1846.721775] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.740625] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.743250] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.766107] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:18 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x300000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:18 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:18 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xc000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:18 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x23000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1846.920751] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.945263] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x800000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1847.010083] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.027973] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.048082] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.068911] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.105990] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x400000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:18 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:18 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:18 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x30000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1847.266533] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.278501] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.287115] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.289739] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.330151] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.342895] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1847.373707] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x500000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0xe00000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:19 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:19 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x3f000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1847.524159] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xd000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1847.567430] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.616358] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.627011] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x600000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:19 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1847.801026] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.808200] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.815086] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.825999] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.828987] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x1000000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1847.850152] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.921426] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x60000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:19 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:19 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:19 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x700000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1848.063898] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.096574] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.116333] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.156483] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x3f00000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:19 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xe000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:19 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x88000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1848.166939] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.188568] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.235720] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x1100000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:19 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:19 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1848.289829] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.394285] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.439752] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.452032] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.475039] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0xfeffff07, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1848.484817] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.486824] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x4000000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1848.555615] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:20 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x2300000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:20 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xf000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1848.682326] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.696567] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.725364] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.750189] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x100000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1848.780490] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1848.827139] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3000000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:20 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:20 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x200000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1848.942685] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.956834] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.972468] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0xfd00000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1849.017546] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.033324] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.042971] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.055826] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:20 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x300000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:20 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x8800000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:20 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:20 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x10000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0xfdfdffff00000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1849.250118] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.274334] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.311537] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.331400] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.342748] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:21 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x400000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1849.369267] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.385547] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.422982] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:21 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:21 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0xfdffffff00000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:21 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0xfeffff0700000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1849.575400] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:21 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x500000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1849.621269] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.656271] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.701407] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.725552] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.731271] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.757837] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:21 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1849.812523] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:21 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:21 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0xffffffff00000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1849.928508] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:21 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x600000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1850.008375] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.033265] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.043650] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.072354] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.077285] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.128273] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:21 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x11000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x2}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:21 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:21 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:21 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x700000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:21 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d02, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1850.298867] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.310474] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.333136] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.334522] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:22 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x1100000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1850.384179] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.393377] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.422649] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:22 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:22 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:22 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d03, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1850.560215] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x3}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1850.624298] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.673531] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.697808] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:22 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1850.744780] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.852128] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.890294] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.938553] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:22 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x12000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:22 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x2000000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:22 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x4}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:22 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d04, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:22 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1851.124216] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.132580] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.133884] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.154737] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.164632] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:22 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1851.191855] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:22 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x2300000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:22 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d05, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:23 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1851.296997] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x5}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1851.391656] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.411082] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.420102] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.421127] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x13000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:23 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1851.462410] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x3000000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1851.537943] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d06, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:23 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1851.622263] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.632453] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x6}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1851.736121] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.770765] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x3f00000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1851.823780] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.838178] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:23 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:23 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d07, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1851.974957] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.001227] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:23 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x6000000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1852.119734] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.145414] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.237033] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.249544] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.258180] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.263985] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x8800000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x8}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:24 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d11, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:24 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x14000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:24 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1852.344785] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1852.418270] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.449820] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.481182] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.500458] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.511119] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1852.555837] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d23, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:24 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0xfeffff0700000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1852.621338] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.646136] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xe}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1852.725247] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.759236] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1852.783600] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1852.862720] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.867400] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0xffffffff00000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:24 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:24 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d30, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1852.996488] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.059262] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.088935] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.123545] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.149355] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.222257] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x15000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x10}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:24 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:24 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x2, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:24 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d88, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:25 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1853.340060] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.350857] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.391134] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.400715] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:25 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1853.436069] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.437663] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.462351] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:25 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:25 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfd}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1853.605950] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.656565] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:25 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d03], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1853.716065] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.763982] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.814228] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:25 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x4, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1853.865031] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.943106] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.947704] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:25 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x16000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:25 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:25 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:25 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x5, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x300}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:25 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d2f], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1854.175779] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.187514] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.196165] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.204939] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:25 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x6, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1854.225075] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.236528] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.241662] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:25 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:25 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:26 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1854.326827] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x500}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1854.402849] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.416855] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.432607] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x7, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1854.470920] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.487853] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.500004] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x17000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:26 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1854.572823] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:26 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:26 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x11, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1854.693780] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.712756] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.750005] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.766185] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.774957] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.791886] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x600}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:26 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x4], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1854.819345] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:26 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1854.952604] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x23, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1855.047454] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.071255] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.088321] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.097556] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.114021] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.159234] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:26 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x5], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1855.358402] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.395377] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.430688] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.460886] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:27 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x1f000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:27 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x30, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xe00}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:27 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:27 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:27 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x6], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1855.533283] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.551372] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.554720] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.595231] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.595396] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.618534] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.630800] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:27 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:27 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:27 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x60, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:27 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x7], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x3f00}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1855.762281] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.816639] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.833415] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.860687] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.886760] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:27 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1855.908521] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.993231] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.008848] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:27 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x20000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:27 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:27 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x88, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1856.044854] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.068545] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.083927] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:27 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x11], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1856.113371] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:27 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x4000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:27 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1856.258918] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.274910] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:27 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x300, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1856.352540] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:28 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1856.397265] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.412609] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.480140] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.486803] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfd00}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:28 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x23], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:28 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x500, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1856.548523] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.735860] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.745123] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.755408] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:28 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x23000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:28 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:28 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:28 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x600, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:28 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x1000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1856.995757] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.999598] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.013922] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.024158] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.029211] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:28 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x700, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1857.064231] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.076896] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:28 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x88], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:28 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1857.173057] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:28 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:28 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x1100, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1857.255317] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.282125] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.285686] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x2000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1857.337369] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.349640] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.368278] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.396835] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:29 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x25000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:29 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:29 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x2000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:29 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:29 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x300], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1857.563631] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.587248] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.615645] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.619730] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.643603] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.656193] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x3000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1857.668101] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:29 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:29 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x2300, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:29 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x500], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:29 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1857.882253] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.918446] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.957137] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.968220] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.979918] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:29 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1858.013630] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.038033] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:29 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1858.155929] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.197259] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.235975] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x26000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x4000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:30 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x600], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:30 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:30 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:30 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3f00, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1858.412411] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.422182] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.439247] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.439822] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x6000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1858.481482] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.482425] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.513450] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:30 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x700], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1858.616270] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1858.657120] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.694396] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x5000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1858.697205] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.731303] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1858.770016] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.829036] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.874021] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.904133] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x27000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:30 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x8800, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:30 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x1100], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:30 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:30 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1859.010913] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.019779] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x6000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1859.066507] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.091201] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.105203] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.112980] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x1000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1859.164905] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2300], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:30 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1859.248670] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.271324] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x2000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:31 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1859.329387] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.350430] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x29000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x8000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1859.434634] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.454198] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1859.498675] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1859.588262] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1859.636720] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.672179] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1859.690786] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.718453] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.743869] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.776529] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x8800], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1859.810480] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xe000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:31 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:31 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x2a000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:31 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x4000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:31 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1859.972336] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.020933] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x1000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1860.131762] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.159250] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.167996] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x10000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1860.187681] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.223997] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1860.276885] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x5000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1860.338072] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.363681] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1860.406744] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1860.465531] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x2b000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:32 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:32 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x6000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1860.508697] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.547357] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x3f000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1860.620598] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.645990] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.660389] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1860.696644] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:32 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x7000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1860.864147] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.876669] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1860.906667] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.949460] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.970053] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x40000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:32 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:32 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x7fffffe, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1861.076071] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1861.164065] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.182992] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.214021] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.227473] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.272800] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.308895] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x38000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:33 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x4000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:33 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x11000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:33 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:33 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfd000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1861.479194] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.490165] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.500005] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.527696] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.537468] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.549527] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x5000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:33 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x20000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:33 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1861.675732] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.731770] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.749338] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.761455] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfdfdffff}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1861.791387] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.815704] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x23000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1861.886119] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x40000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:33 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x6000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:33 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1861.997927] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.023536] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.068169] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.073556] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.076720] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1862.111113] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfdffffff}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:33 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x30000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1862.175724] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1862.231548] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x7000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1862.308277] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:34 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x44000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1862.395138] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.413714] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.468074] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.475286] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.487824] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.510135] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfffffdfd}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:34 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:34 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3f000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:34 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x7fffffe], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:34 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1862.633197] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.716713] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.742838] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1862.761679] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.776271] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.788747] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:34 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x11000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1862.872232] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfffffffd}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:34 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x60000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1862.952977] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.962198] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x48000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1863.019904] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.037209] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1863.062292] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.083861] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.143848] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:34 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x23000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:34 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x88000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1863.194112] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x100000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1863.272314] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.333991] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.369679] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1863.385905] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0xfeffff07, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:35 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1863.507541] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.525653] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.579948] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.597764] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x100000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x200000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1863.671518] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x30000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1863.746325] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.778093] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.892265] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.951085] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:35 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:35 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x200000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:35 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x88000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:35 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x4c000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x300000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1864.089941] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.100373] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.104077] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.115975] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x300000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1864.152816] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.185684] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0xfeffff07], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1864.201549] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.234163] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:36 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:36 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x400000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x400000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:36 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x54000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1864.368369] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.406477] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.444909] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.486342] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.495778] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.497915] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1864.551261] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x500000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:36 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x100000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1864.654256] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x500000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1864.706804] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.716175] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:36 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x600000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1864.753441] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1864.825133] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x60000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1864.903057] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.905507] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.946199] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.985080] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x200000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:36 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x700000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1865.010194] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x600000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1865.138342] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.178917] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.198975] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1865.222389] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.243456] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x1100000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:37 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1865.316529] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:37 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x300000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:37 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x80ffffff}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1865.381444] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.403973] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x800000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:37 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1865.466409] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:37 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x2000000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1865.531926] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.560186] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.573938] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.638945] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:37 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:37 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x2300000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1865.688479] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xe00000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:37 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x400000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:37 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3000000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:37 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1865.828214] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.840543] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.865831] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.929809] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:37 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1865.982428] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.026331] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:37 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3f00000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1866.067383] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.096315] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.141363] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.167526] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.212965] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:38 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x8dffffff}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:38 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x500000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:38 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x1000000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:38 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:38 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x6000000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1866.398520] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.405328] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.420561] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.421512] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.445366] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.457367] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.473174] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:38 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x8800000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:38 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:38 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:38 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x600000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1866.634857] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x3f00000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1866.683473] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.687009] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:38 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1866.756287] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.781556] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.852971] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.894288] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.995199] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:38 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xa0ff0000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:38 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0xfeffff0700000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:38 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x700000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:38 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:38 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x4000000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1867.238201] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.255813] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.260553] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.272666] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.282397] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.308191] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.323782] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:39 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x1100000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:39 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0xffffffff00000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:39 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:39 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1867.445202] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfd00000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1867.546775] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.561254] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.585730] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.613820] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:39 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2300000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1867.671910] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.810480] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.856057] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:39 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xbfffffff}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:39 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d02, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:39 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:39 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:39 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3000000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfdfdffff00000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1868.085137] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.090863] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.102788] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.115354] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.126604] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:39 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1868.138670] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.148939] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:39 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x8800000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:39 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d03, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1868.285391] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.304387] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfdffffff00000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:40 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1868.350852] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.389669] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1868.480075] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d04, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:40 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xc0ffffff}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:40 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0xfeffff0700000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1868.534178] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.549516] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:40 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1868.609273] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.646565] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.698726] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d05, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1868.742663] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.770459] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.783845] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0xffffffff00000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x2}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1868.829321] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1868.870113] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.900307] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.960149] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.985512] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xe8030000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:40 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d06, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:40 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1869.019198] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.073260] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x2, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:40 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1869.136165] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.163928] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x3}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1869.213529] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.258969] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.295617] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:41 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d07, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1869.321937] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.345032] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x3, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:41 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xea010000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1869.441570] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.452251] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1869.488993] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x4}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:41 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1869.567491] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d11, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1869.625071] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.647854] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x4, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1869.714972] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.723401] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.766191] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1869.819200] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d23, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:41 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1869.864039] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x5}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:41 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xeffdffff}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:41 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x5, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1869.956081] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.965137] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.009524] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.024291] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d30, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1870.070337] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.086588] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.102554] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:41 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1870.240919] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.273374] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x6, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x6}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:42 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1870.346131] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.376157] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.393398] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d60, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1870.442960] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1870.510070] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.541145] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.543274] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.613504] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.622145] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:42 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d88, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1870.656971] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.776567] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.790371] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.827263] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xf4010000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:42 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x7, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x8}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:42 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20005b00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:42 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:42 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1871.005103] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.018192] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.028043] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.035694] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.038455] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1871.064339] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.092197] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d03], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1871.133834] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x11, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1871.203637] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1871.258770] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.281517] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xe}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:43 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d23], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1871.315806] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.334273] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.384666] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:43 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xff000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:43 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1871.425736] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:43 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x23, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:43 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1871.519739] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:43 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d2b], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1871.583310] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.616696] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.632205] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x10}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1871.679577] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.717577] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.730292] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:43 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:43 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d2d], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:43 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x30, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1871.874162] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:43 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xfd}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1871.972275] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.980963] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.993829] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:43 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d2f], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1872.089567] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.104998] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.151267] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.207809] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:44 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xfffffdef}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:44 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:44 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x88, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:44 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:44 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d5b], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x300}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1872.450316] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.465643] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.467953] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.484289] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:44 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x300, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:44 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1872.501090] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.523466] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:44 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1872.667562] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.688354] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.697096] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.718056] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.735963] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.750166] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.754908] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:44 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x500, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:44 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:44 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1872.996565] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.005327] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.036156] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.041511] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.057050] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.124694] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:44 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xffffff7f}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:44 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x500}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:44 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x600, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:44 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:44 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1873.348197] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.361453] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.365891] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1873.405438] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.417033] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.419676] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x4], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:45 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1873.552723] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x600}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:45 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x700, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1873.597598] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.630280] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.639455] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1873.671597] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.703456] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.763705] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xffffff80}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:45 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x5], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:45 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1873.845583] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.869762] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x1100, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:45 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x6], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1873.899977] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xe00}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:45 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1873.993492] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.005671] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.031750] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.078258] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x2300, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:45 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1874.133441] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x7], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:45 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xffffff8d}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1874.247460] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.260502] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.272823] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.287292] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x3f00}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:46 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1874.323969] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.335308] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x3000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1874.421886] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x11], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1874.487194] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:46 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1874.553197] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.605381] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.617631] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.671221] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x4000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:46 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x8800, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1874.719089] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.730802] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xffffffbf}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:46 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:46 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x23], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1874.819969] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.848418] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1874.899848] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.921773] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.979836] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1875.002693] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:46 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1875.033508] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1875.067178] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xfd00}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:46 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x1000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1875.155841] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1875.234195] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1875.313481] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:47 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x60], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1875.356758] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1875.416516] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x1000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:47 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1875.467247] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1875.629983] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1875.678607] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:47 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xffffffc0}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:47 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:47 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x88], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:47 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1875.788166] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1875.798322] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x2000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1875.845082] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:47 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1875.929607] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:47 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x300], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1876.031126] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1876.066596] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1876.080744] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1876.225385] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1876.699175] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1876.902774] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:48 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x2000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:48 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:48 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x500], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x3000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:48 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:48 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x10000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1877.234134] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1877.236747] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1877.254002] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:49 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1877.309306] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:49 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x600], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:49 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1877.409697] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1877.444931] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x4000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:49 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x5b, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1877.506317] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1877.524119] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1877.584082] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:49 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x700], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1877.640442] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1877.669520] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1877.748127] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1878.181110] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1878.763545] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:50 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x3000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:50 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x4000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:50 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:50 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x5000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:50 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x1100], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1879.213751] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.219935] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.240009] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.263896] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.289895] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:51 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:51 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x4, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:51 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1879.495867] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.529988] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x6000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:51 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2300], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1879.557499] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.590764] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.630826] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.661163] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:51 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1879.860007] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.903703] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1880.654767] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1881.153709] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:53 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x4000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:53 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:53 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x6, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x8000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:53 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:53 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x40030000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1881.966244] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1881.966365] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1881.976505] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1881.996286] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1882.031922] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:53 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:53 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3f00], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:53 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x5b, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xe000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1882.226350] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1882.298439] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1882.315766] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1882.323728] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1882.397523] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:54 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x6000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:54 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1ffffa, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1882.612159] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1882.925699] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1883.982635] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1884.251049] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:57 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x5000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:57 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x10000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:57 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x8800], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:57 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x100000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:57 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x7ffffff2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1885.471518] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1885.510736] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:57 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x2f, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:57 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x1000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1885.586826] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1885.604568] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1885.642869] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1885.672894] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:57 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x30, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:57 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x3f000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:57 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1885.803543] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1885.880147] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1885.881674] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1885.899437] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1885.954980] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1887.142428] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1887.800844] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:00 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x6000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:05:00 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x200000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:05:00 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0xc8, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:05:00 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:00 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:05:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x40000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1889.248927] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1889.271129] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1889.291742] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1889.296427] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:01 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1889.344208] kernel msg: ebtables bug: please report to author: Wrong len argument 20:05:01 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0xf8, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1889.415926] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xfd000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1889.464463] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:01 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x4000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1889.517775] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1889.579599] kernel msg: ebtables bug: please report to author: Wrong len argument 20:05:01 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x123, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1889.638465] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:01 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1889.788195] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1889.836390] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1889.851834] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1889.906885] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1891.322034] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1892.038367] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:05 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x7000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:05:05 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x5000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xfdfdffff}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:05:05 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x15b, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:05:05 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:05:05 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x300000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1893.959436] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1893.973645] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1893.986842] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1894.020272] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1894.021477] kernel msg: ebtables bug: please report to author: Wrong len argument 20:05:05 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x6000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:05 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:05:05 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x20001c68, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:05:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xfdffffff}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1894.254991] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1894.267360] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1894.285854] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1894.316620] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1894.330560] kernel msg: ebtables bug: please report to author: Wrong len argument 20:05:06 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x7000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:06 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1894.571256] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1894.586063] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1894.655068] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1896.639627] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1896.891661] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:10 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x7fffffe, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:05:10 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b5b, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:05:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xfffffdfd}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:05:10 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x7fffffe], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:10 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:05:10 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x400000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1899.039466] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1899.048388] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1899.054835] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:10 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x11000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1899.098432] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:10 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x2, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:05:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xfffffffd}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:05:10 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1899.263261] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1899.346822] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:11 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x20000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1899.404586] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:11 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x3, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1899.485737] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1899.519581] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1899.615707] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1899.653926] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1901.928939] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1902.038697] [ 1902.040361] ======================================================