0x249, 0x0) 20:56:24 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x35) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 20:56:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:24 executing program 4: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x9, 0x0, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x4, 0x5, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) renameat2(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000001440)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) 20:56:24 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:24 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x400000000000, 0x6c}}) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) 20:56:24 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x30, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1099.992870] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) connect$rds(r0, &(0x7f0000000480)={0x2, 0x4e22}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x100000002072, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000100)={0xad, {{0x2, 0x4e21}}}, 0xfb) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000600), &(0x7f0000000640)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(serpent)\x00'}, 0x58) setsockopt$inet_int(r0, 0x0, 0xa, &(0x7f00000005c0), 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"], &(0x7f0000001580)=0x1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080), 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="73797a3186d04befd01c97606549215e3c9458dada448cfda8ebd20a52f75aa3e0902182b85de190ed0b54a649bc26afdda42766730c795afd71d00f4f377bccbadf39a821a3eb6db96b7400f65549e87d7cc458a28f848e9e4ab9e7de61ff75fbbec13571bf11c8dbcca3dcecce0de7f266959916bc61da4f955e89f423c23f297832c93f5683968a0a861c08626f21cd89250c336b0efe46624d8c060748eef054bfeb00a802b4461f919532483173"], 0xb0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="d10000000000c75820ab5baedd930007003068da4174150f0000daa9cdae72a4f8038c49aad82526d62df448a542e71ce687151b8ecf2321b2d315d28101705f"], 0x40) recvmmsg(r2, &(0x7f0000008a00)=[{{0x0, 0xfffffffffffffce2, &(0x7f0000000400)=[{&(0x7f0000000000)=""/48, 0x30}], 0x1, 0x0, 0x16c}}], 0x1, 0x0, &(0x7f0000008bc0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0x50, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) close(r2) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000440)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=r3, 0xfffffe8f) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x300000a, 0x8013, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@mcast2, 0x1, 0x2, 0x2, 0xc, 0x7, 0xc8, 0x3}, 0x20) openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.threads\x00', 0x2, 0x0) r4 = socket$xdp(0x2c, 0x3, 0x0) write(r1, &(0x7f00000004c0)="2cda4d6966cfff3b1a06a1608ccfc296ce885a0c957ef44a733a3969baf0e5ddecf839d0a633907e433338435aa6eb846ac2454ebb7179901758f8efb394b1f7ca5989073f4a8a4b742e11e460a2733ea77aec81d43435478a2675ef2369a81e7d3522041a6b464b78a8801cf5c5b8f13f362a4d5c4a233d92ee7c566d9ab4f7194673c021267af64099cb0e29e180bbd0d1a025dafba431c51482021b16c06647fb9c5cae79ccac175ba5ce8fa5d718290ce440e1ff6158ca3d26cd92c9dc0ebced7364f007f1914d268d671823b5c9ed1c3bdab89062b8efdb24", 0xdb) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/21, 0x3c000, 0x800}, 0x18) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000001680)=0x8, 0x4) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000300), 0x4) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x8, 0x9, 0x9, 0x7, 0x2}) setsockopt$inet_tcp_buf(r0, 0x6, 0x16, &(0x7f0000000680)="f4635f6eea3882f10c17119bbed2b836d4fd3c097b304f75c3592906f6b224b95e9688e77d458bc6ab1afaf0d5764081787009fdff1cdc1bd5e4e0ea368ce5cfc9ab5c7339299af9463f547f9d2c340bd3b85cced66ddb437a14614215b6b28030e21ed0d487f255fda483384383114baeb1a2afe0cf94e75ab2e423d1ba256ceb1e3d43ce880874f4678098b50a768e150de45a600b4ead5353eaf45b017d9fbc8593205c5b2a3eeb3aecd7d782bbe3cedffb607920893d74153663e760811dc491f7e477a883da5a", 0xc9) 20:56:24 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRES64=r0], 0xffffffffffffffc6}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000005740)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000006a80)=0xe8) sendmmsg(r0, &(0x7f0000006e00)=[{{&(0x7f0000000100)=@l2={0x1f, 0x401, {0x4, 0x0, 0x0, 0x80000000, 0x7, 0x3}, 0x9, 0x5}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="e8bd20f10aa99faa83e1a0fb09c79964b06b72a1247346b4e6954c45aa2f66639fafe954dfcb4fa080c701bcdd3fb79083e0d36b288df42d6cb0854e4959699550ada38ce71fa35e3c231d35dbb26e60fb444a91a2775f76e8cdc1869849b75b44b74ce28d2658366dda1df5b7", 0x6d}, {&(0x7f00000002c0)="9971db62bb92dba37d43a0380874fcba80e886e1647e770590fa3609d7b87cfd6318f56490d413a5148450940d1404f40852a8aacc44eb82328f09155ee7bb1458c48de3cd8eea8d003a90423f6ce8d71b8e0f5c9e2fe627651cddcedeacd447019358e2eaf047d4d98242aa8f18895f5e925f10694c2dce497f39d8a8f222f794052b7e2b8fec79ca6664e68f8885d58c1477564d8f7a50e97e0029e1714bace41b6eb3560985304e040787d0d9a3c97e31d44fd37ed97d94815b24a255ed17e08974ae16485905cedef5c6eb6b2c40dbdbd1abec2660d9aeebb872af69a52155cee92bdee3", 0xe6}, {&(0x7f0000000200)="5c89adbf89b8e47d6714be47a92d6c7188a73909beda9e3eff64f692408a66443aef907897d958e23f31720c9eb59bb5ebd7e2f971316461534d3114f84ae7b241869e5b1b9c09d860474536cd9bd0e463130e3662", 0x55}, {&(0x7f0000000040)="322a97ef2151a32ee5747eba1e1e8231b10552302fd78d0a3ab7", 0x1a}], 0x4, 0x0, 0x0, 0x4000000}, 0x4}, {{&(0x7f0000000400)=@rc={0x1f, {0x256, 0x100000000, 0x5, 0x7ff, 0xffffffffffffffff, 0x3}, 0x9}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000480)="2beed9e51ee0fc244f", 0x9}, {&(0x7f00000004c0)="b01cdf83ba4a8c189273bbad14ddce2edaf3086b9433d0dd568f7432d36244f35d98f936e98395fce52a69ecddb2e7f1aa20758fe78c05061dc4de26a0650bcac7cf6e0aba06240b87bba5987740bdfcb33c26d6", 0x54}, {&(0x7f0000000540)="bff3d47e8dfcbff557927459ed6950f00938318e5e1402bdcd516870227a4e285443c1e1e00b2d45f7cdcf2f275c38b6ab59ff00cb214b3a3a203c6206811205e03551b757870bd0766151c97c974e22f1eabc9643849ea6e9ac58eebed1e36714b7be4858bf7e4cdb2c88fc05b8f30c13c1e50bd3", 0x75}, {&(0x7f00000005c0)="73c075d167918d873e3e6fd2c5b8f66c7a123bf5e7a30a68308592c658be4ec925f4ebc9af0c486ea87694291d4818763b805cc11062ef7cbdb2accb8a2489a909931c05b79f4859e9b6c15ae21330ba9d0d87c8506d278cb2c846d6490c55a4ee82762259957ce2a565325837365decc0999c426d24edb88331acb057f106c9f15950544397ce7e7b591636f681f540e6de2488d3bba84d2916fc5aaedb01c77d286c17226c9b243fddb7", 0xab}, {&(0x7f0000000680)="955ee270a755870204c2d66a8c1ae6aeea230ce338fc7003370961978060d97a0d03acea89e1845b50fb31be18ca95ace3947d36ea09aef9ff62e03994ea02b50c45dff36b338cfcd0475da6f749ae9df96edc53c36154e8f8247f1f5f9aa68841a88e6d31a735c9e5dab95337baba78f97c0bd62dd8fec00351ad67532e973c2261d85c5778f4ca3e72059798e6cd4c2d8df4f69e7b434213f5cfede18459955f40aade402da9b8fd234a4576e95619846b3e15f7c6bac3391c4a657cf1a0c29d3d7bb33d7a191e922633e30148e2a45c7f61c696a66e5bfed2d6642ed0ff70b85b790e39d40f8d23e610ef14c34ad34f24", 0xf2}, {&(0x7f0000005840)="901c068b86a4b88b2f2d101ff4251622a201a602970a6a46a4e9bfda860802e5373d14080adf9a49b2bb4bb9b5ebdb5143b6762743911d3c18d71a3709b7e910606f63d110ee053ca6c654a23a26f18fd873fee9099b12c8f2fe0573d99747648daedb25248b1f88d855dce2f13cab83ebbd8d9fa37e7f202bbbf2c27bc9cad0382848cfc5100a0a8e41c5496fde5ca0a9704de2f53c6afd97b335e20c0e314a1549d831532ac4dff0a54c9809b97df2a434364f26b6b4f9b5da2a40d20120afa8bf363f3b61b9183ca14c85ff7d7a0adf69c42b6aa2dc2bd4b0ee8bc331677ced86618c3a9cc8", 0xe7}, {&(0x7f0000000880)="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", 0x1000}], 0x7, 0x0, 0x0, 0x10}, 0x8}, {{&(0x7f0000001900)=@in={0x2, 0x4e21, @rand_addr=0x100000001}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000001980)="a87f21a67cea7e7b974f9659c990ba0a72ae6aff01d52c57f4462de73cc82d199d5d993735f8a1", 0x27}], 0x1, 0x0, 0x0, 0x20000084}, 0xcc}, {{&(0x7f0000001a00)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x80, &(0x7f0000002f80)=[{&(0x7f0000001a80)="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", 0x1000}, {&(0x7f0000002a80)="8b7863e60e0a82ccdc8f8512903754c4b2cf1c19ba285847e612e74b0d0aa307390f70e65898bd43ed8cf4a72b451aa09e32cffd6db75857a6091cbd17fd9bb323d0989dfb1e6dad9e987df7820cb29b1984517f3071c5e888bf9d6eaf7e63fb0dc7e5a4033e16b90aa7ed894a54f343e67a3372f77a5364bcd2", 0x7a}, {&(0x7f0000002b00)="0008ba7625c62a28eacfacbb5676835fed8ce73a9bebeaf59818c1d1fc4d573d48e6634f6280fe8e0f1637e1442b4c32c9f76d4e64c9246ed9a22c2a72a7fdfe9de83ea86e6b940f8068f7715019e81a1d0fd2bac36fde8406d23c31f498a583555883737d8705f3b9729d971b06c8b414e9ea93ad58ccd52573be28d52954953180b8dd874a9d080caa1e18281b703898e9e42fab550a9eadc2b2cf705fccc739a15434b3ed58", 0xa7}, {&(0x7f0000002bc0)="b8d8ee6d6d6355d242545faf39fbd7450b8de4a01217e5d478efaec9d620c744862fae74534ed9362ca31df9a2687657fb2f892da878e67b8648d9b863c976190a39101f22e2518710ac2e1c665524f625968c0ea7a1", 0x56}, {&(0x7f0000002c40)="140f2ba9dacf179766734f48da4a90eae48b9670ccd47f5a0d0da8805a9979b1cbd5671a5241b653eb2411bd031513d016e290703e1b008ca6b5a0add1a4127dd279daf3d444060a4af4eb3f660bd280c73ec09d4201a9692d9849799c65be1a8155a1a7346db8549052e8ca392dc6fb1b767ffcbdd61ad0e8c0d9ecd08453818c1a74d5961e2b7631c0242cdbcd18ad5fc8912b469254e73bfc8097cbefd524aaedb17c9beb50f80b1cb93030252831b70d122864deee513d6d00fe894cf6760071c0fa", 0xc4}, {&(0x7f0000002d40)="0560f9c297418d24040a73b8d240d5ad42cad9665e445154c2a5070308adea43338bb49bbde0cdaa2e5664f2738c21bd001c215b2c2c8559c11f1d1475fe1367e3b28a333aedbb", 0x47}, {&(0x7f0000002dc0)="e30d99613227bea08330674676feb3bb7d29928e39821ef38a052b8d0d3492351c55978b18293f128992c13b66112198fc8794ae55d40b33943feb02c4e8f8f706ecd16d28a9c3dd2cb7923f6ec649a58e69e88712ad64c0a31ca967294df9b56c40963f4d2f8a50dda926122090155e9b750d0bd40dfc14140c0bb6c7f1a2e6563fe2af384b56e9d9be22cac40cc11ccb5ca0acaf89c53754e59ab5dac28fe819cb35836d2881eca4c13d8588a99bae3f1305e2d77b866d4336b41373378923583e9620df5d6fda8a4d57c9c146028c5511c0dfeaf3c66be6499ff72e35836dfa11a2b5709c12a4ea8163f68122dfe143bd317ae2d9", 0xf6}, {&(0x7f0000002ec0)="8ebe82ffc7ad21ce57104c441ef5c8529d4b20c1338870c0b92e60a5b8576d15d77f407da3a2d1b5209108e635b1a820337e1109937c6bee801e0ea522634f32ab7512c376be4fb562dcb8a57a6a97423be0e32689fc0823afc6a185c010372c7491ddd059abd43cfe35bd076dbb7268247742e0db18ce1d8792d8f6a11bae629bad3c26f0a7f8ef0c", 0x89}], 0x8, 0x0, 0x0, 0x10}, 0x7}, {{&(0x7f0000003000)=@in6={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x4000000000000000}, 0x80, &(0x7f0000003340)=[{&(0x7f0000003080)="820073f543e589c100a33bc2b9d3d56efb6a4b84c4122d3cd1dbfda76446462f063967f5c4a4982dd4b44c558f30ffb62925e16fa5ca1e80575333d22fc2ec7d148fcd52e0701f77ac8d0568a82f5e1bb1881eb2daedf46c211068341703ee88180b7975c71ee2c9c2ae944a7eee8aeadfd945c63efc2892fa030ee88330d3741cd0943f48a9d5bdcd7c4c19c06644de134cbc37eae15e620d40cca63f84ab5fd7fa6c8496db642a61ef20882cf5cb7c299c7ce880df16bc10f9c94361946893bb08dc841528fdce8d6f3f266045", 0xce}, {&(0x7f0000003180)="847673103523b512ab0135b3a54123d6134d4788a37f83bb09fc179347f0a0c4a298c13cca0792b73cd17a20c102685794f4e6ea6269c5efb24fb9d95a7a2a35ac4e6cabb02520014dd3c612967dfc811bfb61e360883b47a5e9f9bb785252e6cd2a09dc1ae37add0d00a33f68ef2180ed32a38b7027bf2d07ddf80983a88633ef525d3afa3c55fa1ab687544cf19ba13a32ba601900fa4ff88befa25a3aa39b8b4302991f5c78e9a10c0424093ce2b3a0", 0xb1}, {&(0x7f0000003240)="930de971e4f7d4536a7a736b4a0618ad42bb77733d195fbeabe7a7d4946e9b192d9e90dcef1a6294c91369e2d6c119a565327477a50e15507f92169deacf04594199441db6b221b0766be7d438ab7e55ca48", 0x52}, {&(0x7f00000032c0)="a4f0ce8079f6a6ba18f3dfffb542c3b8ce6484e650b6369a8a0c973e055c3b608367aed683d183eb2c94ca5f79ce343cfce1b14d36944628ed9fba27619f82f7200a2c427ef16d1687663bc837b8f8f7eeee7475312a38a70ca25ad26c3b6354069cab713a3002af12ee249c64f6a2935095ee", 0x73}], 0x4, &(0x7f0000003380)=ANY=[@ANYBLOB="1010000000000000290000004000000094568b512b87a7e59642c4bb3df936dc6f5b2abbed06ecbef6cc8e55d2d64ca0ef35e98a40dc028107a6324d312d35f79b3423bf65089510c4127114653ca5b7269740e88f02389ce689ccba680578a5c28e1cc69830f34748890d9ac0a04524316683512c755c4c8938882ff5230cf08d04db6971ef93472b9e365184ea87b76878f3272b88160c238d6556125f8d4362f202d53d62c283905e0de92f4628b0a21e20e7fbd4ad73e01b8ac8fe805d7619e1f19c22ac02c8b8f6ee0ec21d8150a4d63075e389989b5f7e4a63fa2ca293b699083e86ef9546d9552745606b9ae49c11ffd29a704fb82c2f1b32730d7157f07dd8a844031c680c2ec87ab13cf9eed1b586d8d513904667e5bc8accfcef06d8263c08014ea25654c99d77bf465c68873b700e070c5d2289ac2a3e2dd83704244540533a389b353a30416c199dc0a940c61b7e5595d7e0c522b482bcfffa0e7fb867d263aea8628908e9b92b35c68ca027edb8b8a27ca8950018963010149640be1d120e2a03a10f6b46783efff2a0ccf755d2be812536e2a2fb5326824c103dba3322b1fe0c3074cd3fb29ef2f3d7fc9929ff72bcc4861970e00c5a713a2fee90f0973d042dee0d2439407a1f31d3e100b52a48a001cd1148cd62b3b2ec02ca9b7ceb8dd7699851a14103315fb189e46ccfa2c99286d34b359187c8c71970686d95eaff2f3aaf32fb64582e55bebe8e85c30096e4be43c9abb1c09bbc683c6dc2229d5f3c4e597e1fdeb479bb716538035ee415a4a874c3902df17d5cf1cda2b73e1f21f530fa86804fbd8fc3c74c8439955e8540db030e0192c48dadf44bfa6b4ec263ebd89c9c031bea5f2b5a24ca6cbe5491597a36b85bde36591b6aaf16e004f039c00518f6c62e4e8ecc453856a5c6b222d33c74b574a8eb2f649632885bfa8e6fa50af2f04ba874f9e81168d7d6eb2769f9871aca346d85d7cf597728280e854cfbf44cb50f93ecfce77515996080d2484b06b0c2a06c64deb171b6bd69b81ea33bc82d562754f1f01809ff6157dedfdd8faca6fa1425d1613f48e1d00d1c72c1e979823cb281ed71792393c314db95beaca21bcbbcc362d98ccbd8a08021e6ac99ac7639b8ba73de1c0d0d129d370626f8d7aed7c883d8e01c4f27fe4041e4d3aaea82caead58d5d18418edfa18ad99070ae5d29a2b3c2ca001ab7ca5ce1d961a1a8e832d67c4300869cc601814323d6f4313f81598ee8e74f32334a0675c0a333b0cf0055d39d7db583f2eb86ef0bfc96e38fc520045b27c6d0697e96f800ebbe0876a5f7e1c289f00ed6f9a4da50244685d015a5ce6474f3f791203ea94ed6115b1122b4ee99ba9d5bf99e16e1c7e433a48a4dcea6c3fc117eb5d4b6728ffc4bed151c0819aa63d0523dae133b769fc972abcf517a7b743c2947b995798fddeabf207439c6c3c45516457af90d8f2e867093f21cbfdb5faba91123b3ac1899ec9ab03f04fc3e820a5facd955aa6a86ae66bdbf071b6d25ca1ed7a88f89c5de9090295019cbb43792a63393cde30a775a7d36b75c729e547688a9fb748c8a08ca1fe1598efae21789bfa93c8d5d78be1fe57293e397170069c30988241fa35f254db05f5f0d07a358b46a36a9eb8a644ca873602d4751fa6f8326aa2aa510012d90691014de931fee1254a213f47e40c6c2167837bb6e6f7d3c094247663e3bfce322d3318f2d90cf18c1fedf933ba85148136d00ea47b5244d71daa2071a88ea4c9a507b1c348f414ad45b9a69956239c0a38ac4f3480ffa03db98a8a1aa1caabc62f678c5736385a4011da5bde28965048a55e2bf9d931dcc3f6e897f8a23d225a28508bcc3d4c14271a386f463a09d5d50ac68dbf0f3c01c1691734ea54fdbbce414f90b862fc97f2e876e67558b368b3d75ea2df47f737641b03fa4f4f1dcb9e83949e317770a4bbed60a4a36abe6eb9d1cf0d36ee2625f295e740a116a961f2a4d5675330d76d5a7c02b469b37d32478e238ee24f280b2ab788ebf344fce725e35baa4693bfd63c734033581b08bba0bc3d7a9943aa6dcb184ed561fe9aef4edf47bbcf50c433d8b866a3d326d3c657b6119777dc20263c8739f366e58204869419e68fd381639f8c9ae04b16b7911bb55d744fa5fabc86a549a54536baf659a6b877c381ed1fc7f73f9c6f1a17bd108c4dd3a675a17c540c7f393f4e576263e437c793bef176b554f51638c2ead20f3484905cd418a95f9e432833f50b5b9666956ccac42306e305108131718faab0e5f8f6d47b0768314a8164c5115acabc40338af830ac5ee6f4e3f6e2b6484ced5a815a88fc0892eff6aefa337d15b25ef9a5b73ddcd8f3bb5d3c8fbb87728552645bb7c3f52e41f65318509d62b60233d44977080ca2613808f820519b28586ced0d40e1bf1e5f8d853bf0b00a091e44906a6ee3253e3e36a0ffcab76055b42d7840b7b25b816cc62aa29ca627f1d9cc58969bdcf312d390cb3fe048217cc8075b19299d7815ec0639edaaf3242d58a2699e9f6330db44ddc5fd2db1a1582289d55daf7fa74271443e6b134c3d5c44e0297f26d097f1c15a5d3029be43df8e427298b319d8960f20e5d69d94dd8c9fe9b107dd9461816e630627995bc00f33f7e5ab266c7af1dc917d2fc24bed37bf023d4d2f2f3ecb19428d18ba0b2559f018d84a1cccd50493378eea7ca91fd8a2754de64d97d5003fbd2855e5244d42fabd158764b669eeaa5cc28226e4a94340c6a1f5141ac09d113a6d498db950db69e9828728bf0f34068c4c03477f6f66c6ebf18b4eb86263da3cfe29ef6b6e68c2f0139d914d194b30c42df190d150c2486902efa3f889c8ebe8c8ef0c40135a4967efd778db050e4d8b19b72335450892bb62f56fcd5d4e426f567d45b5fbdfde14efd427e30daea66d2c9b5f2c5c90a701c1912cf033eb2b39aae23e3a1ff3a3fb01c0f6f300be2e488450971f404856225c6918869b4c259bcbd611a44c7ea845472557839f2e0813acab6cd016c668eab05d6ea8598ac9c3c1098edc639a583b5010e394d0ab2f15c1c658085297cde4509fddcbbe4bc9f82c95234f83f1d7d709de3311a08e6fce005099ea3f98e95152824228d970d1af7d53c39874540436bf98d98f2228ce6bcbd21eaf141b87ba2d1d7f595b5e2b0b6032e5fdc7bc44216d4c143ac0f543c0ebe86d6c7110c7bca5cadb7e261d068e00bdad2853d624bcc4cab39916dbbf4ef1298c6f06259e2db166df757d663646834a18ce5d9d758fb8a3e71eebacdbc7ab572d5fcf1a246e7f4ec75d113bd5575ce752bf7210ce2f528943788190a155dc3788563bf9bffc819d9dfa15d44ef97864a8c88c185fb14b85f690ac87526f7966c935d1952101d3e688886ed40bde00ca6d1e2839404e486fcd15fadacef82ee455bc28a87a81ba76e17b9691f58c55eb749bd7e0da307d03b9b651cd7cafceca2a00dc23eb98eed762a4a31ee165e599ac59f97390cefc78febd2aa6124ecf3fafa0d023663173eec8085a3b7b5b8475dd33f914346ff439da546dfe85a9f5ecdbf5d66a318207aae3f93af0b26c26c11caabf7bdded340a71356cc079c9102792466ba4acc6b1d8d5743638162c888ee2dd3a700f10a4da15eeb983f27249cab988251489671af76c4982b5e9d9e19ab28bb8820a37fc108bd09851fff348edc8b381ca89d10ef671dd317d897a34e887aba08551afd40a7892f8536f68a0aba9edd12ec3b2b6ab4343deeef6b8dccf2cc515afaa00e5fbc99627054128696fe6c9bedf3b11df656ff101260469ea5d2e75bfdca38c42a169e229c4ea89dced0ac4e42e0336a9959a550287593875e07e768f746922be366af1c2bb229e115279b320525e511c6b214847e479d3585e1c034b285eb652578398b389513d11dc7e2fcbc6f8850fd20588a027e6b23f193c6ff7ae413b604acc84779aceb2bcb0bb5c3398cd307f86335ab63e7fe72ce3b0169a6fdb6c6f8b6807ad0493d1fe972df6f8c23a2c3e2433713cd48f52b53fb871347945f6b32f222d4ec686c5b24f0733ac804ebff2d79ea1ed9edff0a0e6161c89b6774e9bc29f88a8f0bc8aa3b1478dc14ea31306b37ff6092ea9e2a2c969f77b46be8c669dca3ef0bab6a20ffa1eebdf3a0e294fad58eac20c6c9e1fcc2f68da7cfe8d9b12dde191b27be0a162a35a6f7fd93529d09b8fc678be52fe75b596dd33ef4ebc903636dc54f6d2af4f06401ba0864d0946cec9d5de8923587e60a1fc60a0a6b0e9812c2316eca8c7ae1a44bbc5aa092d33c32a3aa905a72896684610a6077598b98857461cd7b57c692a0893d3472012d2ef7f936900a44c691aa4cfd457c9a96e336e00c88d4f26cc948039f0a14f5b2793c24318502847dbdb270b2d222e660878917fb28e853f91258eeb660b4d9197286d2df132bd96def9b6af7a7d72ba740cfb725767e018433c71b1367d39277146c5b0cf1d3509869e820dd05f47fd2c923989fba0f3ad6c419f1c04bdc973c2e74cf4da84983cb285d76de9620a39db8df13cc1ffb58bd87fb123544dfd840cf01f5f2b2cb0c9290e53dfc12fad3fa27383d325e16efe985386b590f695fa0fe40525d30dc391cc043befc5b16c48c2dcf5df16f6f2934f381f713772700c10ea82422770c6f5e613da216f41ecaa9725fcef1522d294235b5c7423dca11b330e8aeeaf554da5eaefa98d0cf5f5667dc4b22ac5f711f6c61c3b072e257434dab67b527aabd5ad42dfdfa888b6f396dec0474b944571f4c60ba6ee03b222006b9118b96664bd9e7c011d3d2ca16b986e2ba007fca3ef6e422b2d5f7caaecf8fdceb329f24e94d3d859c6e19c92dcc49f78e3ca54910bdc277d874437fc9d6c20adcf1e095e662365ed760851fb60f8a5f036037b9046e743e62257ac9964d1c88d6b800cc2a0ab91f50967aaa2d9c01395a9001ba5c06210b6df9282d43660bf988cb28d188428689fdecd742d5d33b43ed4cfdc750dcda0a7e375edfef11991adaef24ba506bec2b8129c6fb51d92ea028c34ce082239a9408349faa46bcd4626fc759d78214849ba2880537299314169eaefd571f49ccc2b0b5a134a0f4c2547aa80a3e95f90676818aba7c4e65db5f6d7823f136383b7979b955281e43769f8faf0414b7e086d0c1c4ce5794aeb88b2e725912be126c00494e0745cb43e77ddcf190890f04888f6eb01b746545b3c6bcf8bb7317561685883c792dbfe046851bc0c1a7ce8d7a75e78a4766662a5e4c21d819c8e9df758e4c8ec03af9d0821132e2746292715d0fa959cc52f53d8dec40fc2f7fcdaf3d813a63fe4e3da4b06d956682d40af56f0a2c4aff1cac152f2f912886370c5e06a07abd37b4d91102b0123af5474b1c0537815cce7e828dc9782ea60f1f130df2e73eb76da6d492a82f961a7617ed15b480d20447997e41e40ca0a2256fc76b99bd07fc976f96c9915569fcdeda903b0a1081ac10b8f92d2291b26b187968caec886d9402e17c10748484901130619499781b8fad74f3c7b6d66d8102313ef9153b980302986847dea13a1867adec1cc06720191e679b332033a0885001a97b664b3fe19272b7b3f01b7be3a278cdeb83138011c7e8672ccc4bf9d50518c71aee35e3c7c56a866ce36fd8b83f64a2d09f87611f58d7f37fb33c11b1adb259769410e5a0247a228419791edf2119cc0a34daef542d2c1a869c3fa93baf9291cd6c477e70cac8f36f200c2072bd6c9a42bdde0000dceec3647105114af300000000000000"], 0x1010, 0x4000}, 0x6}, {{&(0x7f00000043c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x7, 0x6, 0x100, "893a6cd8c873aeb14ef497a9de3e6d42d10c7ea166c42fb66b468848df8b00c99347fc81d62668e554f56eb1349053bbaab19c47d0709354fb28a1adba3af4", 0x25}, 0x80, &(0x7f0000004640)=[{&(0x7f0000004440)="b8c49d3a2b2c7d5e7d50377087f7b9df701cc14ebe5b5e889adcaac7e6fab0f2e7d6fa5de1d892125eb49fd5d8b00965fdccd63ae52cdecc5cfafdeabcf94deaaff9b21f5a183ff812e231cafe770f57e8d66965241bdbfd8f2da23bbdb7e10602c0001489c0d64bd671da53386fe290bd166881ec0c600cb7ff6be27d200c4254d2c6d630f351bc42e5393ba64c0fd0096cc13b", 0x94}, {&(0x7f0000004500)="75a3e885ad866b13cf03c1294f1ba2598b569d61ae40e8664d67a67c079f40f2436168426cdfc88d184d6c7a17dfa02fb8cc945e007f0db8ee6f54e192187e44811fb997ae", 0x45}, {&(0x7f0000004580)="a2c8e5165e0e8d920b75a390f53976d73c33251eda64e563da48b6bee75ea9087cfba6f454b83515d4cac7c33720f0e0809cb55b0cd0f4bdd2c8792f1200c301c9601d2c7947eb7ef03a06f42430b0e738607bd8dcdaf14c1797eec5d0366d4a82808d7a4a2eade2b43addfd2f28b50e8983b2fc4a88a2f7e1322a4adfb61a38767802f4d001583b0f9d187ea4e5391d2d46e45373cb3cb1f1c6b914522124f3f611cfde51e919d8ab068d0484aa980e41261c98305d9dd6c195fa24", 0xbc}], 0x3, &(0x7f0000004680)=ANY=[@ANYBLOB="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"], 0x10b8, 0x8000}, 0x1}, {{&(0x7f0000006ac0)=@hci={0x1f, r2, 0x3}, 0x80, &(0x7f0000006dc0)=[{&(0x7f0000006b40)="ce0ce66550f90ed86332101b76186d6b269dbb40dbab9f347b12dedc045c665d53f9df888494b0fe6355207144c93f6a7c9b1a75ad61039096585f30438c5f5d1fb1427c3c2809b54ab4626f7c136b86433d552f5f1e38f4180e32d0c9e54aa6b4eecf22c97d3d6ef8e4f24af0", 0x6d}, {&(0x7f0000006bc0)="a2d5e4b9af1ce186af49ee050ba366e38fe68a2dd376db33188541ba24d18edcc7e6a72710438d80b1f70a350fc06ade90a8887b1293a444adbcfea7192dd5ffab1d032d1ac2065c99cfe58bba1eaa515af9980f28417e5ac0e91221288145b5f6fd33eb80af1e3e24cbfbb2281c85272f63465db89dbf6d04fbaec647a721844ff9a46bf9ff6c76794f9d091113314bc924785bf38d6672ba18be12bd86a3b8d13ef8", 0xa3}, {&(0x7f0000006c80)="5418b3879be7d041f4aba5b3c42cfa08c61f1236ba87e47045edbdb3f3788eb15d7eac232b2acf75c4cdd7947a102abbfcf211396f98388cac9435461c955777552299d0f3fb11c6f3041974b62c95652b3c82736c611b48ad7f2e046105075ac54e24f2929bacbdcd7f370df711d676d9c6b5f5dc2547146df94b78d386d1f6e6208fae54ebbbf53ae4b2f6a1f6", 0x8e}, {&(0x7f0000006d40)="4c77b26b7d29d556f2a88a644407972b0d9fd3eff682cb371e89b5ecf13b054988f540db31cdd3c28c453cd5e31fc64f152df0213936208d4e25c107a989c2430002d37eccc22f49edfbe134b90228ba5da549539b0ffed1321dac859d30075d0595", 0x62}], 0x4, 0x0, 0x0, 0x4}, 0x7fffffff}], 0x7, 0x4) bind(r0, &(0x7f0000000780)=@vsock={0x28, 0x0, 0x2711}, 0x80) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000005940)={0x0, 0xa6, "00780e8ce59ab85928a34464d765eb274a1b5183a573d906701f142520b2a6728dab8ef50fafdbac31d5f11ed1fe267b7e2208260114700f7a5baa823463747c0ae177ad2dc1450523f1921edf26326fd9f46d6e9c0d1c8bf9d2e345e7d534b65272cf6aa95afaf9679a6eaa460ac4fc5434cde817ed1742f5f70d088e8c2d0ed995845c464da76c6719a3f06cc9e4fd7d4f21d99f5f3664f7d57a110a4a8c9f678aa5084a5a"}, &(0x7f0000000840)=0xae) recvfrom$packet(r3, &(0x7f0000005a40)=""/14, 0xe, 0x0, &(0x7f0000005a80)={0x11, 0x1e, r2, 0x1, 0x1ff, 0x6, @broadcast}, 0x14) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000005a00)={r4, 0x81}, 0x8) [ 1100.097583] ISOFS: Invalid session number or type of track [ 1100.116425] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1100.119015] ISOFS: Invalid session number 20:56:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1100.268404] ISOFS: Unable to identify CD-ROM format. 20:56:24 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") munlockall() sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) [ 1100.361646] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:24 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x54, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:24 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1100.672242] ISOFS: Invalid session number or type of track [ 1100.681860] ISOFS: Invalid session number 20:56:24 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) getcwd(&(0x7f00000000c0)=""/77, 0x4d) [ 1100.720983] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:25 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x3, &(0x7f0000000200)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 20:56:25 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x2e, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1100.777122] ISOFS: Unable to identify CD-ROM format. 20:56:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={"6c6f00000000000000000000eaff0040", &(0x7f0000000100)=@ethtool_eeprom={0xc}}) 20:56:25 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") [ 1100.960654] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1100.995527] ISOFS: Invalid session number or type of track 20:56:25 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = dup3(r0, r0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@int=0x20, 0xffffffffffffff73) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000000c0)=0x7) r2 = socket$key(0xf, 0x3, 0x2) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020d000010000000000000000000000003000600da83000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff1b3f0000000000000000001f0300000016000000039aadf80a001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) [ 1101.012035] ISOFS: Invalid session number 20:56:25 executing program 4: r0 = timerfd_create(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x40085400, &(0x7f0000000280)) 20:56:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1101.154187] ISOFS: Unable to identify CD-ROM format. [ 1101.227400] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:25 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1a4, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:25 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") listen(r0, 0x12b4) 20:56:25 executing program 4: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='discard']) 20:56:25 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000feffff0700"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1101.483983] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1101.517205] ISOFS: Invalid session number or type of track [ 1101.523433] JFS: discard option not supported on device [ 1101.532111] ISOFS: Invalid session number [ 1101.611186] JFS: discard option not supported on device [ 1101.667210] ISOFS: Unable to identify CD-ROM format. 20:56:26 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode'}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:26 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x201, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000100)={{{@in=@rand_addr, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r2, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x400, {0x8, 0x3, 0x6}, 0x2, r3, r4, 0x9, 0x7ff, 0x0, 0x4, 0x7, 0x1ee000000, 0xffffffffffff7fff, 0xffffffff, 0x9, 0xfffffffffffffff9, 0x8, 0x695, 0xffffffffffffffe1, 0x8000, 0x6}}, 0xa0) 20:56:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)={'security\x00', 0x33, "18029ea690858bfb92c4925e59511d2128a26cae33f48d67b991621df681c0e5e56f5704d56fb1cf1f353403e8df243529848f"}, &(0x7f0000000100)=0x57) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000001c0)="b7da122b891bfc4e2f00000000000000", 0x10) 20:56:26 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xd0, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xb0, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1101.917080] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1101.980110] ISOFS: Invalid session number or type of track [ 1101.998521] ISOFS: Invalid session number 20:56:26 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000000c0)) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) [ 1102.067686] ISOFS: Unable to identify CD-ROM format. 20:56:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000ffffffff00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:26 executing program 4: r0 = gettid() socket$inet6_tcp(0xa, 0x1, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], &(0x7f0000000280)=""/129, 0x81) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) tgkill(r0, r0, 0x0) 20:56:26 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode'}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)={'security\x00', 0x3b, "18029ea690858bfb92c4925e59511d2128a26cae33f48d67b991621df681c0e5e56f5704d56fb1cf1f353403e8df243529848fc1c7e807f2889a8a"}, &(0x7f0000000100)=0x5f) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000140)=0x4) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000001c0)="b7da122b891bfc4e2f00000000000000", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000840), 0x0, 0x0) 20:56:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:26 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = socket$inet6(0xa, 0xfffefffffffffffc, 0x7f) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x100000001}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000240)={r3, 0xff, 0x30, 0x3, 0x3}, &(0x7f00000003c0)=0x18) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000400), &(0x7f0000000440)=0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000140)) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) [ 1102.358497] ISOFS: Invalid session number or type of track [ 1102.400780] ISOFS: Invalid session number [ 1102.483736] ISOFS: Unable to identify CD-ROM format. [ 1102.505718] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:26 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode'}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x6, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:26 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f00000013c0)={0x8, 0x4, 0x7, 0x4, [], [], [], 0x0, 0x1, 0x1, 0x80000000, "54b2f94e588ebfe5347c94d338b0e523"}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='attr/exec\x00') ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000340)={r0, r1, 0x7, 0x7, &(0x7f00000002c0)="23e66d99205a7f07253fd7ef61988ed59295d1093627f45b4d2b694538e5197225f64ada23d767bfb5c9668362eb6b14225584b45c10f8203f013bc6f6bf3aeb360f", 0x5, 0x4, 0xfffffffffffffff9, 0x9, 0x6, 0x2, 0xfffffffffffffffe, "1d27eb271261f7972e105ccc48b400083c8095debbc683a2115f57471401f5ecccb41ccf8013db4a5a09aa50dd517844f5dcabfa93430c5ad2a22048e8d5577c1fb2fcf860b25c519e8721dd64f57c34555d66f22e40e7992c54b836b4f2cd4c24c3b5cc5e7efa70b415141bbc0022a308909cf7a7fbb1748df661789f7b2495b8a415e3557fdeea9e6d98c4abc22f890b7a1cb32e7e94c4b381b3e27219db28322e98609fa3842e7da38b1f629133a11259c81df1e302d5faa302f300b33ae14156f67da82fa85b645768ba8739ca998bbf9af207fdf092c6a8060dc978eec52db81fb116a367eec641a068da067dbcd4dd845029d2d87bbb7b59dd301b49090f879e4369c8f23560a8cc198f1eae1a37bfdbf8051e76890ce779c124936b4cbee16cc41dd505575b98cf215b139a7fe91060e3809151e9fd86d5cfd492a8c505d95092e59b587eeb13e92bddac19efa7f1be47a286f0f179aa774928aa6645585c409b340792e0c6dd7a134bb3be5457ccb81fc30c3265c01c32c0ec27fd0aac2a03add25f3b17163e5d223bbc0e2384a720a5359501cf4a6dd2c62608e66edcef206f5b425e4c543819fadf189171d9e65717fcfbf8160900f692e12eb46341d3f341c2fb713e548e3402ff4bddec90e41575934ac8a7c7e42803fee7573b3a926b8f5d5c4f687d6c40c0fae9c8db38e5a9b281b1cb59888631a5aafdedea56f53803574e12b06b1c13e7b2c3b11b1345af939fb6f45c7a998ee58bb415f9f45a9642b7bbe7dc0d6ed3e5d547e8ef001bf165e55dd6411d51580a0c9122a0c4817b24171352c6652b0d35aa1c85cc0b3050b699e9fa6f479225eb6be14036169319d1a8991d1f01d676c0fd29b3a2c6ed3bfc61b7aaa43f1e248f1440a08b08749b39339f568d6f6b6c1012646cf2e6582497f0deb90eba378746f893392ed681a0805892e79f566b4b36bca23d3bcb43e24eaf42db8aa00d6fceedad65b6348eb3b695f76cad2c1d1bb39204d1bcf3decb9b3d736fff35b607d47d24e19690a6c76bf4723467155fa8d4c52d7163b55746990ef22003ea304eb2dad512fb0ad045485505df48fd14a69336dd9e00441e1229e65a230c546d10139beda5f27109c357c2471258b3e254151f564da0b98f4d9e3fa84ead85147c9d5dc40d16a820cc08094c4b9c82beb93211894df77e48d2a4f6f08e0d41bf083e51f4259454a974b97f8b1e5b1814abb40a19fc77f6f28b1eef1e232a077a979b536875718333b258d1670f053d0f3f80a2afc0899b69581bcb84885313453a41a2bb2a71cb37ea0933495da422a36364f31182e01f94c843064983604aceb574e122e895970bde16564223a2681b21ba81ab01bc82edae77c3c75d2dc95ede07da8f0e7ee7f78b9dfa788b853e93d842908c47663eb14cfd00f5417fd5e726cfddab9b4e53d6c6a2dc6c3e753b032b2ecb6b46ebe262e842444e1ce948f3a688c2eb41e0d43760d4245899789b89700f5f79da35d7877f57a18befd93ddce552fd77918833241faafa8f11cb1ac6d4768726a045fb51d24eb9d4a5d423b4636430fe74a4ecb64b29f309a1fa2a54a6bb01020f39da043d137073e898f4a6f937691f13f0d18c3543d9d6fb3198da606de33c58768c759897b5a7a82c57951a4c11c550850a178d6f2f1d4bee7f217ae45d278835a21bee83f22eb9a537478fce4633479973386570dc24698537c08fb29d94c5af83d20740ce00e763c08dab36fb22370a311e26e1161955cc98366ef16c4681f5d60b8f7c7cb38745bdc5dad0d5c9ba1de7de31a48fe79598ea211ee3711ae66792352576e5b8f7df83aad118dc30227b7a95197d39b0fb480764a6388d93a835be9fd39d489358cf2ea25dee33410f6bdb9ff274cad6f20439e6b1aa806eda46df7abe2d9d1b92fbfb6879ae4b9921aa16419a2854991ca3e8ca479a42ceffb8c2ffdf32841615f6673a6842a8a7f580439e5cff5a82cc9c7a48bb198db7bfcc801f2b75ec288480451478bd32f1520096597da1e300442bea11c82bd55fbdcecdddbb8360be2a8cae8760cbd883bcdcdf16d56d0f1189d1b9e3fb99e842aa3d8bff57558f004e7000ce5ce21a120549e2352ad8a7dd052473ff0d4ee5bcabd373893af1669f6d6911d27811ac96b84c2cc115c2c5d958a9e9202acde258aadab2af2138ee1348df66a095ff065ab07e73704c7bb8085a5ffaa46553c4ddeca568280ddc4597dec5a7e66b81c79c128f2c4a3ccd16d419966307e4ed7a7ba74e1c289cf36a0c55c8eb60b58e551cbd2e1da51c9a9adb91ceff2697441a9284040dfe84df76718365968e52098583afd3f023d4048b1e8fb07fd749c8bb83dccc07c2f6fe8b4a5c0979609bb9901e3ff3f09fca2604fef39e471a8bffe4d2364e5168a8377689d468e04e75f92a4903aa851807ae8c01b854e1544361cee7bc97e11c2946e1f8a97e77b21a64b8fb337ccac142312b8b32e74b603c401f738892be7bcde080500a5dba8d4b1e143641b6ea00f9690eb18eed8a8cb7d53934cc5a681b4508f07e7f8ff078ee700129f21e131720fe5d57987fa0f6523293cb0934507ab11a7ba06c1aeca5db6175fbe71ec48f0924f69a6476fc16d7d8c84991e99abbc6b9819d19d65c3dd7bab735988e2c4ecc2cdbffa440e90a4327a93c834f63421c015391ba1479d13f73743d0eff99267cbe8f72b98ac93dc7df9d2db86e72c3c11c98e3edbd52dcc57d09cbeeb86cfa36c0d47e4e96ef2a0a1b286b651e6daecd674297faef07c0c8d798057d4d8fec91fcd0932cbd3227e8b7c72902c6a9644b8bc5a2f81f8e4a97ec09c368ff353d1c84c9ae9424c733cba81b78c7b39cf6362e59b00c78fcc31e6e3171731eeb3c1cb1e0c47cf56e83b8217ed1040f93a6845927393d3c75ea589059f510ab703e8854197a503872ec12d7b3ac677e1d6a6db0ffabc8984efdd96d449915ec6a7b5358f781c4df1af9f4c01e21cf5ba7fe8170c3640475497427836f8095beabb07e8b93d94702f7860bb913610f4a3e4e87bb3f24df0be07e0949815abaf6c0afbdd50aadf1b5b9df25035161e37627a702c1556d37617135be8f7bb0bce5b8af91d8f0b17a51c437ca40f8b1190be008eda0cc2a463af7a5b96037e59982c48a496842d365f9159f04e36a1d0a8a4c13cb086d54f8c34c84316e3b77fcf2e97d69d6aa545377f7d812526fe5906fc22b3ba7ce25b70e8462ec5cc75b6cb853661d3a2d4d4e539287c2024168c0c5879373923ab52d5c43e47ce26a817b89289a55115bdf8d1f91b84c2677168cf2c89a846a4dc2f8c7eb8d51cad2e629323f5f9c993b319313f98a3ef8e0cd2bd367375bd4a902de7f6c651808f760d7b95ba0678f2152518e02014a61b73bdafed9f0b86e0a1268377be6f70ce3057f22625f4de413d8a4800133b19d158b8e0a7171ca397576c7dd5b94419bff397fa70631cbf95cb9e43477480d86d80d9a57a17e6812750a88d68e9cf2817590404659ad35c9a0716b30443acc629dba35fcc4e08c9cfafde8dfcb55127920781ca3b1c8d15b7a27dfc2001364cf9bf3e56fb6ab9a01ba9812a653bc551c1d5d9efc69f8eb10261dbca7388f7e14c72c7ad96621cd5fd2273c56135a5e5b08bfb650b11890442667725f842c9b440b6d4724ee73251bb353ff1c6928a455eadf16c230e41f4d18e2e7c0fbb7356d439a9ac528758ef64947a98fd717f96f6a53eb171084e83c9925f74d02258696d9fb6f6a60dffa8fc85f8fc6795a91a356c8e74b3c6245d1e85a4adb248dbdabb84b839d8dcf0f4d90db71f27edaa0f6362a77f886c4cac2ba3a56e1d74f555fbcce9427a587a18f5d602f2ea89fcb7d066ecc45081f0afbebbd0d7f5d995605e385db7f95e16875ed7f7d4baf4e844ebc57b1f5ac82b59649ebb2a1bef05863da03ef434bb38927c9b28950f7bea2e08058d99d1e47838ab234e9d7de1efd4ecd36697e055799b83b6c57b34df2f0b5fa60af3e64b0890f33372152f5183ec878124902637c20fe981e2abee4b69ad6bb086031a2574ad06f07caf6f47c7a133b7a4fd8ed6c8ced73d0f06c22e813fcc8af52ee2b46b0bb43989a3c179a193ad82a1873aa831723f2c6823a317e07f11855859704b5f0556f567e207ec68109bae3baafe6c1cd9294e122356876589092e17dc2fc29684b7f23ef6a7dbcd380c361fedf30e29973c499b9c347f0574cc09388efc80d17c2e2aeef312ff20083b8e16ca635c08e140d54f4886654a63a0a63a73ddee2c57c4d91007f7e60eb9ada4b62226677bb2b0d11c90d36008c589d5aaaf57516ace6e0ade6009805457bee1ab07a1b875af9953b0a7774d0a072df0e7cc32c3a203929a69c9cee19548d702f5d741ff04c840c1c17eca708915e4195b6faca35d89b2577e12ad2488536caa17716dc3c58046882ad1eb34a989871d977b8d1d97cb20b2f7829fba0fcdb294389b910f8a682e37fefae9775f522f98e7aca8c3bc73d8a64250666cdc3135f607a730b2ad1a4a86f72e849221c6be9d1a5ea94050ee6747ca11ded9ee39c2a2da6a6388b20b29229b3c681762c3dd4af780e63191e3299bbe6bbe8ce8631482ffee8cfc29ddf227174698cc096574b9f2da8087a92766e5830191623ff5f858e00350dee2f5557be837e5a1f5621c45244e8e7313a756563f3a05c8b6049263181507c16a609460fdb8fa064824be9ba5fb89a258345b6a2bb6711cad583f7ba8d12a495b00db8a7f24cea726811e421240af7d587966fbfbed6dd006c6b6130d801ae545ca14daec7d9e87529058fa33e965e60c70b3851598b3cb09866ceda587c0f6a91b81f62e3c51bec56f73bd982ee699a08d9ba04d1e4c7d53e6e344391de47ad39605cb42309bd00a47e1bbf911ccb55fa41ac72656764c43658e538aa935620f281b665e8c405009bac4c7c1bd2ece847634a2d65ca609bb10468ed2223917b3d10f81bf6173aefc09e86cdc7039ec0170c36a191f32f0dc9513b064f136ad60d2758918e998f6fb392400350fd5f7639af794729013a2da01a83c23175cb80a4fe0e1e263a90b4d720dcae21495e93d988b836410b81a1e73b2d55609479283a919aab2b21bcb805e0e79ff86bf46911fd9eb92671acd60c425c47448b82b20094a738cdf4d6695809c50c254e185b3a3d4f34af60de2df0171f3f1e5a1db8595c4742c9cd5cdc2378744b9d84b72fa3bb5ebcffd1df707ac626994ea1deb61e15f5d1f078ec58337f03eb3e5c141f485fd73ddff55242366e2093d56e58245963c3599119b1fd5ca8325cf17b6cd3d2fdb12e8ee46402dbc4efd6352cca926a2ae239dcfc4055beab93e2b7ae5e59b8c7751d225ce4fd031ffe0141d22d6f65c07ca88adb164c78b322e1f1e31878bc82a3f9ae7b37730bdebfe7aa89887f28ccd82c0dab78666a75c9fcd1958ee9b33dbaf5da0f0917e52050db97f00cfb73fcf92c9fcdcb18f833db5afe690f0c9fa9e9cac44245bc178b6ee8d4065a24bf69bc2237809003f8d194a1302bbcbc2865f89bd9297f36b37e3a475da264be64814d2bc350c46179d9d17ff8b880a1fe0fff02aadb9831601a33025e4119673d5c625008e94447815fe74ba34577654c8ed4b3a7ce7858c495b0dcececb071c0960e9f16c86a7b48c5125e2a34cf1f2f91b41de5cec94a642b838ad901e6fe8cf16094f4aad0bbfa179e72c49fc7d26c252eb41ea3d17ec3f2ef25c1fe5b98b9147c9927df5d897c1ede901d0c"}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x81}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000001c0)={r5, 0x6}, &(0x7f0000000200)=0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") openat$mixer(0xffffffffffffff9c, &(0x7f0000001380)='/dev/mixer\x00', 0x40, 0x0) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000e90208c869a24f2a00000002000000e0007edb7c83c5e9108a000008001200d06afce709217311dbb74065a20200020000000000752200001800ff0003030000ff3f0000000000000000001f030000001600000003010000000015000000000000000000000000000300050000000000020000"], 0x80}}, 0x0) 20:56:27 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x19c, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:27 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1102.772952] QAT: Invalid ioctl [ 1102.785309] QAT: Invalid ioctl [ 1102.791461] ISOFS: Invalid session number or type of track [ 1102.797113] ISOFS: Invalid session number [ 1102.847000] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1102.894939] ISOFS: Unable to identify CD-ROM format. 20:56:27 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:27 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:27 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:27 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) [ 1103.267833] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1103.303913] ISOFS: Invalid session number or type of track [ 1103.344960] ISOFS: Invalid session number [ 1103.507209] ISOFS: Unable to identify CD-ROM format. 20:56:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)={'security\x00', 0x3b, "18029ea690858bfb92c4925e59511d2128a26cae33f48d67b991621df681c0e5e56f5704d56fb1cf1f353403e8df243529848fc1c7e807f2889a8a"}, &(0x7f0000000100)=0x5f) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000140)=0x4) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000001c0)="b7da122b891bfc4e2f00000000000000", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000840), 0x0, 0x0) 20:56:28 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:28 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) acct(&(0x7f00000000c0)='./file0\x00') ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 20:56:28 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:28 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x5, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:28 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x158, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1104.120647] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1104.143117] ISOFS: Invalid session number or type of track [ 1104.165657] ISOFS: Invalid session number 20:56:28 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:28 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x4, &(0x7f0000000240)="003426f44d28cfc2cd0000") fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000000c0)=0x1) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000400000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) [ 1104.287086] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1104.310641] ISOFS: Unable to identify CD-ROM format. 20:56:28 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:28 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:28 executing program 2: r0 = msgget(0x1, 0x200) msgrcv(r0, &(0x7f0000000300)={0x0, ""/100}, 0x6c, 0x3, 0x2000) r1 = socket$key(0xf, 0x3, 0x2) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f00000002c0)="ac65bd919bd818a0e677655b9db6a93a4149e15c0279b20a00006923ab2981308f80ff776a9421fd4c09") sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f030000001600000003010000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0x22e0, @dev={0xfe, 0x80, [], 0xa}, 0x6}}, 0xffffffff, 0x90}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000200)={0x5f, 0x800a, 0x1, 0x2, r4}, 0x10) [ 1104.488391] ISOFS: Invalid session number or type of track [ 1104.558008] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1104.563582] ISOFS: Invalid session number 20:56:28 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1104.700107] ISOFS: Unable to identify CD-ROM format. [ 1104.750986] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:29 executing program 4: r0 = socket$inet6(0xa, 0x201000000000001, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x50, &(0x7f00000000c0), &(0x7f0000000000)=0x68) 20:56:29 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:29 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x123, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:29 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:29 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x5d, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1105.051415] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1105.090474] ISOFS: Invalid session number or type of track 20:56:29 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1105.124848] ISOFS: Invalid session number 20:56:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) [ 1105.243718] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1105.276313] ISOFS: Unable to identify CD-ROM format. 20:56:29 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)="6c6f67696e7569640044c4fac2e6dae38fa5cce5156100000000c9e937f22b6e146b3715be414fce402f1c60319d26a13b38a2ccfd972fc241cc627dc516fd") preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 20:56:29 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:29 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:29 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d000010000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e000000100000000000000000000000000"], 0x80}}, 0x0) [ 1105.558451] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:29 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1105.643082] ISOFS: Invalid session number or type of track [ 1105.679660] ISOFS: Invalid session number 20:56:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) inotify_rm_watch(0xffffffffffffffff, 0x0) 20:56:29 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1ab, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:30 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x17d, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:30 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYRES32=r0], 0x280}}, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x400042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in={0x2, 0x4e20, @rand_addr=0x3a0}}}, 0x90) [ 1105.783417] ISOFS: Unable to identify CD-ROM format. 20:56:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e24, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 20:56:30 executing program 2: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x3, 0x802) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) r1 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000180)={{0x4, 0x2, 0x0, 0x81, '\x00', 0x5}, 0x5, 0x5, 0xfffffffffffff000, r1, 0x2, 0x6, 'syz1\x00', &(0x7f0000000100)=['userwlan0nodev\x00', 'eth0#mime_typebselinuxvboxnet0vboxnet1{-#vmnet1^{trusted,selftrustedcgroup@\'-wlan1\x00'], 0x62, [], [0x3, 0x80, 0x7fffffff, 0x2]}) r2 = socket$key(0xf, 0x3, 0x2) socket$l2tp(0x18, 0x1, 0x1) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d00001000000000001f000000000003000600000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x80}}, 0x0) 20:56:30 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:30 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xad, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1106.356979] ISOFS: Invalid session number or type of track [ 1106.366621] ISOFS: Invalid session number [ 1106.391736] ISOFS: Unable to identify CD-ROM format. 20:56:30 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x10001, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000300)=0x4) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = socket$key(0xf, 0x3, 0x2) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000340)={{0x0, 0x3, 0x6, 0x3, 0x4}, 0x2, 0x400, 'id0\x00', 'timer0\x00', 0x0, 0x1, 0x1, 0x4dbb, 0xffffffffffffff81}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000000c0)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000440)={0x0, 0x0, 0x0, 0xff, 0x38d9, 0x0, 0x4, 0x17, 0x0, "af651496cda6005ce56e262f5528f0f803f0d14b36b103c8a61c12af07373c7b37f3bed38f9862d593aa2e4977d45f69183d632cfb121359c6d19fa516505833", "8af73cbca908173823004016afbcb5c485524465ea1625f7d283f46d673cc045c20d6e17e1642e6e82dcbb338d43e4abaa96708c38bb346eecc49e5c70303d42", "df187da0200bfa086a1186260c5fa0c0f8cbb045356a7b9b03499a14026fec1c", [0x200, 0x81]}) connect(r3, &(0x7f0000000200)=@ll={0x11, 0xf8, r4, 0x1, 0x2, 0x6, @random="ed9e94aa55a1"}, 0x80) 20:56:30 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") [ 1106.586754] ISOFS: Invalid session number or type of track [ 1106.593081] ISOFS: Invalid session number 20:56:30 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x106, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:30 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:30 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') r1 = syz_open_pts(r0, 0x80001) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000680)="56657450df4b1ee1adec4f3baec37a9de23d28287f5314e014a5faddf4d31e8b572de3242f1c269f36feb2a2f1e8c9af575d0c220447cf713f5d8b73869f7d690330eaec2a650c99bcb915b87cb7d6be393f602e924bf5549b6f9522cd39643d83d7fa10e30c1bb9e06bee4aac4c564ec50696e33c7fb47f6e89639b24e71a027e807a2d70a961a6346fd97a19dfcee1fd3936f5f3d5db7ff693c2873c8504467e289d9654e0c0962dd3d818ceb2336ba09a0b9726e2c7a556ea62b74a5fe8f78bd44e3cd70f84933afb956bd23a8dc009f74b1fb506325b70638b8eb11923") sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x188}}, 0x20008000) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002f90100000000007d2200001800ff0003030000ff3f0000000000000000001f030000001600ff07030100003f000000000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) [ 1106.692962] ISOFS: Unable to identify CD-ROM format. 20:56:31 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:31 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000100)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a0000080012000200020000000000910e58fd5d01e5220303000007000000000000000000001f0300010016000000030100000000150000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) [ 1106.943303] ISOFS: Invalid session number or type of track [ 1106.949554] ISOFS: Invalid session number [ 1107.017924] IPVS: ftp: loaded support on port[0] = 21 [ 1107.104428] ISOFS: Unable to identify CD-ROM format. 20:56:31 executing program 4: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000012ff8)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000ffffffff) [ 1107.124939] device bridge_slave_1 left promiscuous mode [ 1107.139553] bridge0: port 2(bridge_slave_1) entered disabled state 20:56:31 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = dup2(r1, r1) r3 = memfd_create(&(0x7f0000000100)="2470726f634026656d31d4fc00", 0x1) readlinkat(r2, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/56, 0x38) linkat(r2, &(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000180)='./file0\x00', 0x400) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x283}}, 0x0) [ 1107.200811] device bridge_slave_0 left promiscuous mode [ 1107.206359] bridge0: port 1(bridge_slave_0) entered disabled state 20:56:31 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:31 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1a, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:31 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x159, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1107.376897] team0 (unregistering): Port device team_slave_1 removed [ 1107.416186] team0 (unregistering): Port device team_slave_0 removed 20:56:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000500)=""/164, 0xa4}], 0x1, 0x0) [ 1107.423804] ISOFS: Invalid session number or type of track [ 1107.468159] ISOFS: Invalid session number 20:56:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)={'security\x00', 0x2c, "18029ea690858bfb92c4925e59511d2128a26cae33f48d67b991621df681c0e5e56f5704d56fb1cf1f353403"}, &(0x7f0000000100)=0x50) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000001c0)="b7da122b891bfc4e", 0x8) accept$alg(r2, 0x0, 0x0) [ 1107.488682] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1107.572021] ISOFS: Unable to identify CD-ROM format. [ 1107.605779] bond0 (unregistering): Releasing backup interface bond_slave_0 20:56:31 executing program 4: socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x0) [ 1107.800844] bond0 (unregistering): Released all slaves [ 1108.816564] bridge0: port 1(bridge_slave_0) entered blocking state [ 1108.823196] bridge0: port 1(bridge_slave_0) entered disabled state [ 1108.831051] device bridge_slave_0 entered promiscuous mode [ 1108.876931] bridge0: port 2(bridge_slave_1) entered blocking state [ 1108.883587] bridge0: port 2(bridge_slave_1) entered disabled state [ 1108.891181] device bridge_slave_1 entered promiscuous mode [ 1108.937750] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1108.985177] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1109.123847] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1109.172543] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1109.372276] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1109.379741] team0: Port device team_slave_0 added [ 1109.423727] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1109.430953] team0: Port device team_slave_1 added [ 1109.458555] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1109.487369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1109.516297] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1109.523760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1109.532032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1109.556378] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1109.563629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1109.572281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1109.839603] bridge0: port 2(bridge_slave_1) entered blocking state [ 1109.845994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1109.852788] bridge0: port 1(bridge_slave_0) entered blocking state [ 1109.859233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1109.866635] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1109.909045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1110.825545] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1110.915696] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1111.004944] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1111.011547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1111.018592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1111.110310] 8021q: adding VLAN 0 to HW filter on device team0 20:56:35 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:35 executing program 4: 20:56:35 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:35 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x20000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, r1, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xad}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4e}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x88}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000054}, 0x40) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) r2 = socket$key(0xf, 0x3, 0x2) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r3, 0x8912, &(0x7f0000000480)="80e0475d0003000000e301") sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) r4 = dup2(r2, r3) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x0, @mcast2, 0x800}}, 0x20a4b858, 0x8, 0x2, 0x80000001}, &(0x7f0000000240)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000002c0)={r5, @in6={{0xa, 0x4e22, 0x6, @loopback, 0x5}}, 0x80, 0xffffffff}, 0x90) 20:56:35 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x207, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:35 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x118, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1111.653846] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1111.663736] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:35 executing program 4: [ 1111.780443] ISOFS: Unable to identify CD-ROM format. 20:56:36 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000002c0)=""/165) r1 = socket$key(0xf, 0x3, 0x2) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x10401, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000840), 0x4) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x101100, 0x0) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x2000000, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '/dev/full\x00'}}, {@afid={'afid', 0x3d, 0x2}}]}}) [ 1111.820303] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:36 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:36 executing program 4: 20:56:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1111.898374] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:36 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000002002000000e00000010000000000000000"], 0x80}}, 0x0) 20:56:36 executing program 4: [ 1112.054730] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1112.102732] ISOFS: Unable to identify CD-ROM format. 20:56:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1112.149479] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:36 executing program 4: 20:56:36 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") [ 1112.281534] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1112.349033] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:36 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x28400, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f00000002c0)={0xb, 0x0, {0x53, 0x7fffffff, 0x3f, {0xffffffff, 0x1}, {0x4, 0x3}, @ramp={0xfffffffffffffff9, 0x7, {0x2, 0x7, 0x0, 0x7}}}, {0x57, 0x8, 0xffffffffffff8001, {0x2, 0x3ff}, {0x0, 0x200000}, @ramp={0x7fffffff, 0x7d, {0xffffffffffff8000, 0x6, 0x1, 0x64d}}}}) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x4000) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) bind$bt_rfcomm(r3, &(0x7f0000000080)={0x1f, {0xffffffffffffffff, 0x0, 0x2e, 0x7f, 0x80000000, 0x6aa}, 0x7}, 0xa) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000003c0)=ANY=[@ANYRESOCT, @ANYRESHEX=r1, @ANYPTR], 0x31}}, 0x0) acct(&(0x7f0000000380)='./file0\x00') 20:56:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:36 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x16e, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:36 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xbe, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:36 executing program 4: 20:56:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000ffffffff00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:36 executing program 4: [ 1112.543256] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1112.559874] ISOFS: Unable to identify CD-ROM format. [ 1112.560403] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1112.625854] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:36 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session'}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:36 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x56, 0x10}, 0xc) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = epoll_create(0x3ff) r4 = timerfd_create(0x7, 0x800) r5 = socket$nl_crypto(0x10, 0x3, 0x15) r6 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x10}, 0x10) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) ppoll(&(0x7f0000000500)=[{r0, 0x8000}, {r1, 0x4a4}, {r2, 0x1000}, {r3, 0x10}, {r4, 0x400}, {r5, 0x2100}, {r6, 0x2200}, {r7, 0x50}], 0x8, &(0x7f0000000580)={r8, r9+30000000}, &(0x7f00000005c0)={0x5}, 0x8) r10 = socket$key(0xf, 0x3, 0x2) socket$l2tp(0x18, 0x1, 0x1) sendmsg$key(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 20:56:36 executing program 4: [ 1112.684469] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1112.774800] ISOFS: Invalid session number or type of track [ 1112.822192] ISOFS: Invalid session number 20:56:37 executing program 4: [ 1112.869009] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:37 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) ioctl$void(r0, 0xc0045c79) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d000010008db6000000000000000003000000e0007edb7c83c5e9508a3165080012000200ff3a8e7f00007d2200001800ff0003030000ff3f2215ed5c53ac6e0000000000000000001f030000001600000003010000000015000000000000000000000000ffff0005008000000002000000e000000100"], 0x80}}, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x50002, 0x0) setns(r2, 0x3fffffc) r3 = syz_open_dev$vcsa(&(0x7f0000003240)='/dev/vcsa#\x00', 0x7, 0x40000) sendmmsg$unix(r3, &(0x7f00000036c0)=[{&(0x7f0000003280)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003500)=[{&(0x7f0000003300)="66987baa20385327a3ed9b5abf159913f04026a0317841e1dfeb1224fc8e33527bd8a5638c21ef74ca18b43391bc8e4b644af4b716a69cba7ba5868aa6ef81b0432fe69d58ce7409d008ad834a06038a419ecbdbc8d888775c42045f1d2ce58391980bb90aba92a3878df0ba200d444dcd8923a63f71583da83c3c1769f7c6494a592e6d74cf4d2e90dcc8f9644e74c902b8e0786bb828f89e97126e7808c1ed4db4d2c9e93c55174b23f5a7a461d4fcd9dd84a65bd8ac1c71775d4b402010b73f8b10cbb41f7ac8cc1ed3e962ff0035b58a29e50def0eb3ad4fcf469f842ad0e240c990ec049e31bcdd3bc2166e8ff0aed54d3dd3419af034", 0xf9}, {&(0x7f0000003400)="80b298fe83a26a511c931365ca76bc142aa1bd52e5d6ca24b9c487ab1389849e6f86ec2d899a9073e9e8490ded9a9643575830436bfc91f994893e69460cc03d0718dc3cc2aec1c20dec64fce3a07bf5a24fd6735de37e47be57f0db020248e89829ec950027d2976daa80ccad8c1bda71411957142a215d58b80336315681404899aa9cd50ca1513d7d20db715a2f87929b6f35a9426eada8124bf9408192aa21cc87808312426f43fe278fbdf332948732e7d373648fcb307e8d5f6c988b602f7f1126dc6869f7985dbaf59d17e3b26bc8daa6b35aa45c7e84dbc76656a1af63", 0xe1}], 0x2, 0x0, 0x0, 0x80}, {&(0x7f0000003540)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003680)=[{&(0x7f00000035c0)="a84e1c17dcbe82bc9a443b054fc016a990e21a7098245e056de753c0a4a72e9b8539026bfc0d7a55e8079ba6c172bcb18e813e5b75827e0318c7b48e1b61eac47a87b04607a299ee7af1ed821a8d595986d884ea2a62485ea9f7fbe9b753dba5d7b59ee493f81413912887493c0bd88d9f80127f93c89d5d", 0x78}, {&(0x7f0000003640)="3dddd526c80410ae8c60b8c0b01868a4939530b98dad7f472dce4ee58912fcd7e50ee6c9c3b8f7d9389b80f8e5d677134cb3", 0x32}], 0x2, 0x0, 0x0, 0x800}], 0x2, 0x40) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000100)) 20:56:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1112.920678] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1112.952455] ISOFS: Unable to identify CD-ROM format. [ 1113.096950] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1113.115058] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:37 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x179, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:37 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session'}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:37 executing program 4: 20:56:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:37 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x192, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:37 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) pipe(&(0x7f00000000c0)) r1 = socket$l2tp(0x18, 0x1, 0x1) socket$alg(0x26, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000100)={'veth0\x00', 0x8000}) 20:56:37 executing program 4: [ 1113.361850] ISOFS: Invalid session number or type of track [ 1113.367513] ISOFS: Invalid session number [ 1113.376108] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:37 executing program 4: 20:56:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1113.439340] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:37 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000140)={@mcast1, @local, @loopback, 0x5, 0x8001, 0x8, 0x100, 0x101, 0x20080, r3}) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ffcd8eea60c678659ab1ec5abb79fa0003030000ff3f0000000000000000001f0300000016000000030100000000150000000000000001000000000003000500000000000200"], 0x80}}, 0x0) [ 1113.525504] ISOFS: Unable to identify CD-ROM format. 20:56:37 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000480)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f00000004c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000001c0)={0x5, 0x6}, 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000100)=0x14) 20:56:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1113.564238] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1113.592522] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1113.710740] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1113.793417] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:38 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x5b, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:38 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session'}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:38 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000180)='\x00', 0xffffffffffffffff}, 0x30) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x200000) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00', 0xec, "c5637f85bf7c4011206603811d06c1b03cdf226132615e13e9c9f5f5f3b37558eb488ba621e812bc39b81a8c13906783627f426f89eece30508e160f708b9182248257b19dfec1bc7b53d4d0447b8f7eb9f5f609412951e4c0060468246ff484313b5cbd7f584738f58099732b26f76dae0948265e264c05a338d9d436cdcb4b49340a8c4892c7e0f2148996284f7673cbd3372d56c33d51a8d211edc3555dd5806b14d60287f1fc4f3883cdaeecef13563fa545fd86b5af2840df45208e9da021ed404586eb1e5fdec28f9f32785aef1ea4143068a49a598e02343e7b4ac2376d37b76e00f90353ae0274b8"}, &(0x7f0000000040)=0x110) kcmp(r1, r2, 0x5, r0, r0) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r4, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYPTR64], 0xfe94}}, 0x4000000) socketpair(0x0, 0x7, 0x6, &(0x7f00000000c0)) pipe2(&(0x7f0000000200), 0x0) 20:56:38 executing program 4: clone(0x200, &(0x7f00000001c0), &(0x7f0000000000), &(0x7f0000000200), &(0x7f0000000180)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000400), &(0x7f0000000b40)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 20:56:38 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xf5, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:38 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1114.011014] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1114.039280] ISOFS: Invalid session number or type of track 20:56:38 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1114.059688] ISOFS: Invalid session number [ 1114.065419] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1114.096597] ISOFS: Unable to identify CD-ROM format. 20:56:38 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x10010, r0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000100)={0x5, [0x0, 0x1, 0x0, 0x20, 0x3]}, 0xe) [ 1114.177659] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:38 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") [ 1114.231131] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:38 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000feffff0700"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1114.334060] ISOFS: Invalid session number or type of track [ 1114.349037] ISOFS: Invalid session number 20:56:38 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:38 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x3ea}}, 0x0) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8, 0x40000) recvmmsg(r0, &(0x7f0000001780)=[{{&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/202, 0xca}, {&(0x7f00000004c0)=""/215, 0xd7}], 0x2, &(0x7f00000005c0)=""/178, 0xb2, 0x1ff}, 0x7f}, {{&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000700)=""/92, 0x5c}, {&(0x7f0000000780)=""/202, 0xca}, {&(0x7f0000000880)=""/95, 0x5f}, {&(0x7f0000000900)=""/242, 0xf2}], 0x4, &(0x7f0000000a00)=""/166, 0xa6, 0x2}, 0x8}, {{0x0, 0x0, &(0x7f0000000ac0), 0x0, &(0x7f0000000b00)=""/194, 0xc2, 0xc63c}, 0x7fffffff}, {{&(0x7f0000000c00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c80)=""/74, 0x4a}], 0x1, &(0x7f0000000d40)=""/105, 0x69, 0x90a5}, 0x7}, {{&(0x7f0000000dc0)=@pppol2tpin6, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e40)=""/167, 0xa7}, {&(0x7f0000000f00)=""/217, 0xd9}], 0x2, 0x0, 0x0, 0xe}, 0x41}, {{&(0x7f0000001040)=@llc, 0x80, &(0x7f0000001400)=[{&(0x7f00000010c0)}, {&(0x7f0000001100)=""/225, 0xe1}, {&(0x7f0000001200)=""/156, 0x9c}, {&(0x7f00000012c0)=""/175, 0xaf}, {&(0x7f0000001380)=""/82, 0x52}], 0x5, 0x0, 0x0, 0x4}, 0xf223}, {{&(0x7f0000001480)=@alg, 0x80, &(0x7f00000016c0)=[{&(0x7f0000001500)=""/217, 0xd9}, {&(0x7f0000001600)=""/179, 0xb3}], 0x2, &(0x7f0000001700)=""/98, 0x62, 0x10001}, 0x7}], 0x7, 0x0, &(0x7f0000001940)) sendto$packet(r2, &(0x7f00000002c0)="2aed6c63ecb18df9ebb2f6bd9ecf56f35f9aeb7f9bde51d84164a2652f110a441712e92af9acdbf70c2f9119b80b79d85538509415f7575522df7f84549bf7fa1daa0f10102fd1ac94c581182a72a0f58f6807e382f88c15931d58fff78b54110e503ac03da6fc76386e0f196795c09b9c8556a7340e1c37b6e3e31c2458155e68d2f75d51747c1937bef4b8f54ae2bae8b40f2ea146706a3cbb6860470ab5bdb931f74d30de271ce16817e8bed08563571f89699ba3358b64cbfff2a6dcb0423c75fbcaffc5f1bb2fd43bcd14b224ce0c69df", 0xd3, 0x40000, &(0x7f0000001980)={0x11, 0x9bdf54fa0fd04a11, r3, 0x1, 0x2, 0x6, @remote}, 0x14) syz_mount_image$iso9660(&(0x7f0000000ac0)='iso9660\x00', &(0x7f00000010c0)='./file0\x00', 0x575, 0x1, &(0x7f0000001a00)=[{&(0x7f00000019c0)="6a701d44190179efd18d28dde61b", 0xe, 0x1}], 0x0, &(0x7f0000001a40)={[{@sbsector={'sbsector', 0x3d, 0x2}}, {@norock='norock'}]}) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000100)={0x9, 0xa5d0}) [ 1114.471698] ISOFS: Unable to identify CD-ROM format. [ 1114.491926] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1114.538618] isofs_fill_super: bread failed, dev=loop2, iso_blknum=18, block=36 20:56:38 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:38 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x85, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:38 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") [ 1114.776447] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1114.800456] ISOFS: Invalid session number or type of track [ 1114.810261] ISOFS: Invalid session number [ 1114.894800] ISOFS: Unable to identify CD-ROM format. 20:56:39 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:39 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x214, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:39 executing program 4: r0 = memfd_create(&(0x7f0000000080)="2d42d54e49c56aba707070f00884a26d000b180034a24579dbd1a7b1533a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4e6e600000", 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000140), 0xa5ff) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f00000005c0)=ANY=[], 0x0, 0x0) 20:56:39 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") [ 1115.131739] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1115.165879] ISOFS: Invalid session number or type of track 20:56:39 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1115.192451] ISOFS: Invalid session number 20:56:39 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x4d, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:39 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x1c1480, 0x0) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) [ 1115.333957] ISOFS: Unable to identify CD-ROM format. 20:56:39 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) socket$l2tp(0x18, 0x1, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") [ 1115.577502] ISOFS: Invalid session number or type of track [ 1115.583977] ISOFS: Invalid session number [ 1115.639999] ISOFS: Unable to identify CD-ROM format. 20:56:39 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) socket$l2tp(0x18, 0x1, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:40 executing program 4: r0 = memfd_create(&(0x7f0000000280)="2d42d54e49c56aba707070f00884a26d000b180034a24579dbd1a7b1533a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4e6e600000", 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000140), 0xa5ff) fchownat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 20:56:40 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x227, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1115.927742] ISOFS: Invalid session number or type of track 20:56:40 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYRESHEX], 0x2}}, 0x80) [ 1115.979607] ISOFS: Invalid session number 20:56:40 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1e9, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1116.115939] ISOFS: Unable to identify CD-ROM format. 20:56:40 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = request_key(&(0x7f0000000180)='rxrpc\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200)='^\x00', 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000140)="4a2a94afa3c8fce60f5b84e8373da6d624477e187355ec03361054a8ae615f785923bc782771", 0x26, r2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 20:56:40 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) socket$l2tp(0x18, 0x1, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:40 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000080), &(0x7f0000000140)=0x4) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/48) [ 1116.447945] ISOFS: Invalid session number or type of track [ 1116.524286] ISOFS: Invalid session number 20:56:40 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) socketpair(0x3, 0x4, 0x93f7, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x1, &(0x7f0000000140)=0x1) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 20:56:40 executing program 4: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000000300)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000480)) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00007e5000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r2, &(0x7f0000003b80)=""/184, 0xb8, 0x0, &(0x7f0000000180)=@sco, 0x80) bind(r2, &(0x7f0000f70000)=@un=@file={0x1, './file0\x00'}, 0xa) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000040)) write$P9_RATTACH(r3, &(0x7f0000000500)={0x14}, 0x14) 20:56:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000feffff0700"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1116.585892] ISOFS: Unable to identify CD-ROM format. 20:56:40 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:40 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1db, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:41 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000400000000001f0300000016000000030170c6d988fb000000001500000000000000000000000000030005000000000002000000e000000100000000000000001e2b43a688c37af0c141b8c738664cfe4817d9d131094e00fd05d1677fce8617105ecb644ea65f9bdad428cef304e0154d29be9b02f92fd1d36555ccca920a9e8dd354fcc15ccf7d1e52c618e8d4e36c8daa34a958f9b51fe2e7b6ba64cdca160000000025c4aa523353541a545a21271b12e0ec27495b0c782f2ba4e1967e5e834caad5d5ec95f4f531e58fe96b7f0c4c7dc506a3b458c5c48524e9eb284b9abbe38b183ca233757849428bb4803428e5dd0454738aa067d7fa6e3eff8ea56b8ef34a8aa2ce74b3d7fd480c16aaa901e2daf0a4e405910548a0b23372f5731bb0b1905cfc23820283bb6487c46701d6f94f00"], 0x80}}, 0x0) [ 1116.767344] ISOFS: Invalid session number or type of track [ 1116.773714] device bridge_slave_1 left promiscuous mode [ 1116.780578] bridge0: port 2(bridge_slave_1) entered disabled state [ 1116.819325] ISOFS: Invalid session number [ 1116.832701] device bridge_slave_0 left promiscuous mode [ 1116.838237] bridge0: port 1(bridge_slave_0) entered disabled state [ 1116.880330] ISOFS: Unable to identify CD-ROM format. [ 1116.892259] IPVS: ftp: loaded support on port[0] = 21 20:56:41 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") 20:56:41 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x117, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1117.027652] ISOFS: Invalid session number or type of track [ 1117.041750] ISOFS: Invalid session number [ 1117.093559] team0 (unregistering): Port device team_slave_1 removed [ 1117.111434] ISOFS: Unable to identify CD-ROM format. [ 1117.141771] team0 (unregistering): Port device team_slave_0 removed 20:56:41 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") [ 1117.197478] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1117.287888] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1117.365648] ISOFS: Invalid session number or type of track [ 1117.379961] ISOFS: Invalid session number 20:56:41 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x19d, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1117.474578] ISOFS: Unable to identify CD-ROM format. [ 1117.485033] bond0 (unregistering): Released all slaves 20:56:41 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)) 20:56:41 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xed, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:41 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020d0000100010000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000529e0c10ea245ba09f16e10a7c59e0ab133ff1863a3d60a9"], 0x98}}, 0x0) [ 1117.722891] ISOFS: Invalid session number or type of track [ 1117.752340] ISOFS: Invalid session number [ 1117.881893] ISOFS: Unable to identify CD-ROM format. [ 1118.953511] bridge0: port 1(bridge_slave_0) entered blocking state [ 1118.960179] bridge0: port 1(bridge_slave_0) entered disabled state [ 1118.967811] device bridge_slave_0 entered promiscuous mode [ 1119.019417] bridge0: port 2(bridge_slave_1) entered blocking state [ 1119.026016] bridge0: port 2(bridge_slave_1) entered disabled state [ 1119.034241] device bridge_slave_1 entered promiscuous mode [ 1119.084177] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1119.130574] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1119.230919] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1119.264521] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1119.450985] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1119.458451] team0: Port device team_slave_0 added [ 1119.503874] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1119.511173] team0: Port device team_slave_1 added [ 1119.539425] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1119.571601] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1119.603407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 20:56:43 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) [ 1119.633786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1119.953286] bridge0: port 2(bridge_slave_1) entered blocking state [ 1119.959676] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1119.966300] bridge0: port 1(bridge_slave_0) entered blocking state [ 1119.972719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1119.980153] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1120.759722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1120.953083] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1121.047196] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1121.150983] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1121.157178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1121.164982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1121.256548] 8021q: adding VLAN 0 to HW filter on device team0 20:56:46 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:46 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") fcntl$setpipe(r0, 0x407, 0xf838) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) getgroups(0x7, &(0x7f00000000c0)=[0xffffffffffffffff, 0xee01, 0x0, 0xffffffffffffffff, 0xee01, 0x0, 0xee00]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x2, &(0x7f00000001c0)=[r2, r3]) 20:56:46 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)) 20:56:46 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x19, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:46 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x14a, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() mkdir(&(0x7f0000000280)='./control\x00', 0x0) inotify_add_watch(r0, &(0x7f00000012c0)='./control\x00', 0x80000d53) open(&(0x7f0000000000)='./control\x00', 0xd40beb2474dfd227, 0x0) [ 1121.835107] ISOFS: Invalid session number or type of track [ 1121.840970] ISOFS: Invalid session number 20:56:46 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1121.888030] ISOFS: Unable to identify CD-ROM format. [ 1121.903308] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1121.924815] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:46 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)) 20:56:46 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f00000000c0)=0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 20:56:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) [ 1122.046979] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1122.088460] ISOFS: Invalid session number or type of track [ 1122.124273] ISOFS: Invalid session number 20:56:46 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1122.143465] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1122.152411] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1122.243394] ISOFS: Unable to identify CD-ROM format. 20:56:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:56:46 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) [ 1122.291746] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1122.366913] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:46 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") 20:56:46 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1122.429452] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1122.551254] ISOFS: Invalid session number or type of track [ 1122.563132] ISOFS: Invalid session number 20:56:46 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x3d, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:46 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1f9, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:46 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:56:46 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x7, 0x20800) renameat2(r2, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x2) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) [ 1122.662731] ISOFS: Unable to identify CD-ROM format. [ 1122.673810] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1122.707625] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1122.718282] rtc_cmos 00:00: Alarms can be up to one day in the future 20:56:46 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:56:47 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") 20:56:47 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x2, 0x800000202) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000100)) r1 = socket$key(0xf, 0x3, 0x2) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000064001500000000000000000000000000030005000000000002000000e00000010000000000000000000000000000000000000000"], 0x80}}, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)) [ 1122.861036] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1122.875300] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) [ 1122.940397] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1122.964444] ISOFS: Invalid session number or type of track 20:56:47 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1122.991130] ISOFS: Invalid session number 20:56:47 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x8000, 0x105101) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f00000001c0)={0x2, 0x0, 0x1, 0x0, 0xf}) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) socket$l2tp(0x18, 0x1, 0x1) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$UI_END_FF_UPLOAD(r3, 0x406855c9, &(0x7f0000000100)={0xb, 0x1, {0x57, 0xfffffffffffeffff, 0x6, {0x200, 0x5}, {0x2, 0x2}, @const={0x135, {0xc36e, 0x3f, 0x3f, 0x4}}}, {0x55, 0x401, 0x3, {0x4, 0x6}, {0x1f, 0x52}, @cond=[{0x6, 0x8, 0x9, 0xffffffffffffffc1, 0x3, 0x3}, {0x10001, 0x1, 0x9, 0x9, 0x4, 0x1000}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xe7) [ 1123.078452] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1123.089474] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1123.159058] ISOFS: Unable to identify CD-ROM format. [ 1123.163603] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:47 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x87, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:47 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x9a, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:56:47 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") 20:56:47 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:47 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000000000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) r2 = dup3(r1, r1, 0x80000) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x1f, 0x0) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x3, 0xfffffffffffffff7, 0x8, 0xadb, 0x6e, 0x2, 0xfff, {0x0, @in={{0x2, 0x4e24, @remote}}, 0x2a0e2c51, 0x2, 0x800, 0x9, 0x7}}, &(0x7f0000000200)=0xb0) syz_open_dev$loop(&(0x7f0000001840)='/dev/loop#\x00', 0x1, 0x0) syz_mount_image$f2fs(&(0x7f0000000300)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x9, &(0x7f0000001700)=[{&(0x7f0000000380)="b441a1a2a7", 0x5, 0xffffffff80000001}, {&(0x7f00000003c0)="af844acec4a00a55342334358c22415b0711194b3979c2f15c46799393c3548f125c75f8015a29afef7fe2d8ae5218edc5c3ae9bdc6abce3", 0x38, 0x40}, {&(0x7f0000000400)="fc84d5ac5c524d864105b492731a71d40d309765adf5873adc09f3abb9ea68c5f07cf1d1433f05bd40184945b157f7d1c73ec25d5a6e910be1bfb8961f0cfc490c7e8e681d3e6950b3a33f21a695b91200a2aa8bfd78ce5afc4639db6015c61a0e835fb37c7ffb2356a7c3b0e138971ec971b96b", 0x74, 0x8}, {&(0x7f0000000480)="bf342a1bb92aec93baca54ddaccc30f01fe9729bb2b3a09f3ec735fb7157ca98bc6376f032044c1245ec08638cb30a10e2b3b45c86a0187e5a8e5128c22c637a7c1fb805e79593c09ebb572871ceabad36316804bf60893ac53d80f3be9b1ede9ae063b7b0508b7199f541a8bdd5af0bc3ea4d6011197954d2f42a9c9487241f9e1adc3bd929e8a88975626d8dbcabf1b16009ba00a043065369a7992a1d91cf537d9f3edd0834396d3fafb4575dcffd9f858d3f3f2b0e89cc60456b", 0xbc, 0x1}, {&(0x7f0000000540)="1cc890eb9cf6e05793f817f6303acfe61f82eca6666fc5a2249b96407a1d91c6892d51515483f76c26a827f214ba940b83f114dc", 0x34, 0xe145}, {&(0x7f0000000580)="28045e8aa823761f207d4d9ea778b5c47f0841597f0f8ec0492d810ac6c3a81065236e5ec3d24e38e640bccb2bb3b24df8d3c8f3799b6fb74936d4c5212b401b667516d3d5ece3d095b3d2283986bd9bdf1913e1648811c8", 0x58, 0xc7}, {&(0x7f0000000600)="5d11bdb51c885cf6a3ed1ed1695291fd07f558aa5589ecf27fa1281b0bee2215d6ea62659d44801f5b1a59fda0a001d4e1f01bcb8a5018e35cb1863342001f98b93e4b6e08a65dbedbbd5f521df294d8a64ff7536db22f300cfad1f163c0f3149f9bb4230fe3f61034eac1fc854eac90fae0772cc707b2c40676685f9a9be8a15b1c06c152c3c2122966a14bd3ed37029b975de8b602787fa602b11a9ecea5fcd0736e05ae21ef87c4dfc0b6c7146050facc9d4d067ee4b02b5f0d573d", 0xbd, 0x8}, {&(0x7f00000006c0)="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", 0x1000, 0x6}, {&(0x7f00000016c0)="2893167c5184a5e4ea20a3f177ac4de79526d5d7f9abff", 0x17, 0xfffffffffffff10c}], 0x2080, &(0x7f0000001800)={[{@inline_data='inline_data'}, {@nobarrier='nobarrier'}]}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000240)={0x10001, 0x2, 0x1ff, 0xffffffff, r3}, &(0x7f00000002c0)=0x10) [ 1123.461230] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1123.463956] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1123.469782] ISOFS: Invalid session number or type of track 20:56:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) [ 1123.518225] ISOFS: Invalid session number 20:56:47 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1123.575308] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1123.611488] ISOFS: Unable to identify CD-ROM format. [ 1123.618143] rtc_cmos 00:00: Alarms can be up to one day in the future 20:56:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:56:47 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x800) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f0000000040), 0x4) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000000c0)=ANY=[]}}, 0x0) 20:56:48 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") [ 1123.742364] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1123.838247] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1123.845205] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:48 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1123.913427] ISOFS: Invalid session number or type of track [ 1123.930138] ISOFS: Invalid session number 20:56:48 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xf8, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1124.084692] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1124.101831] ISOFS: Unable to identify CD-ROM format. [ 1124.124384] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:48 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x128, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:48 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:56:48 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) mlockall(0x2) 20:56:48 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:48 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") 20:56:48 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) mlockall(0x2) [ 1124.303052] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1124.323600] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1124.343160] ISOFS: Invalid session number or type of track [ 1124.371977] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1124.419355] ISOFS: Invalid session number 20:56:48 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:48 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:56:48 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) mlockall(0x2) [ 1124.609950] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1124.635567] ISOFS: Unable to identify CD-ROM format. 20:56:48 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x89, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) [ 1124.652605] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1124.670500] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:48 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) mlockall(0x2) [ 1124.760022] cgroup: fork rejected by pids controller in /syz2 20:56:49 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x13e, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:49 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:49 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") 20:56:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:56:49 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0xfffffffffffffffe) 20:56:49 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1125.055102] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:56:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:56:49 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) [ 1125.308237] rtc_cmos 00:00: Alarms can be up to one day in the future 20:56:49 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) [ 1125.495787] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1125.505850] ISOFS: Invalid session number or type of track [ 1125.518995] ISOFS: Invalid session number [ 1125.609293] ISOFS: Unable to identify CD-ROM format. 20:56:49 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x27, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:49 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLERRORu(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='\r'], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f0000000040), 0x1, 0x0) close(r1) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000080)={0x0, 0x8001}) read$FUSE(r0, &(0x7f00000005c0), 0x1000) 20:56:49 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) [ 1125.762446] rtc_cmos 00:00: Alarms can be up to one day in the future 20:56:50 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x21c, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:50 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") 20:56:50 executing program 2: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000140)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x40345410) 20:56:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) [ 1125.942241] ISOFS: Invalid session number or type of track [ 1125.947905] ISOFS: Invalid session number 20:56:50 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8005, 0x4) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1125.983522] rtc_cmos 00:00: Alarms can be up to one day in the future 20:56:50 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:56:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) [ 1126.139836] ISOFS: Unable to identify CD-ROM format. [ 1126.190816] rtc_cmos 00:00: Alarms can be up to one day in the future 20:56:50 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") 20:56:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) [ 1126.383562] ISOFS: Invalid session number or type of track [ 1126.402964] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1126.420276] ISOFS: Invalid session number [ 1126.497657] IPVS: ftp: loaded support on port[0] = 21 [ 1126.588938] ISOFS: Unable to identify CD-ROM format. 20:56:50 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x26, &(0x7f00000011c0)}}], 0x249, 0x0) 20:56:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:56:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) [ 1126.667159] rtc_cmos 00:00: Alarms can be up to one day in the future 20:56:51 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1e3, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1126.779067] rtc_cmos 00:00: Alarms can be up to one day in the future 20:56:51 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:56:51 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") [ 1126.969907] rtc_cmos 00:00: Alarms can be up to one day in the future 20:56:51 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x85, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1127.057047] ISOFS: Invalid session number or type of track [ 1127.068511] ISOFS: Invalid session number [ 1127.160508] ISOFS: Unable to identify CD-ROM format. [ 1127.259409] device bridge_slave_1 left promiscuous mode [ 1127.265096] bridge0: port 2(bridge_slave_1) entered disabled state [ 1127.331352] device bridge_slave_0 left promiscuous mode [ 1127.337043] bridge0: port 1(bridge_slave_0) entered disabled state [ 1127.521920] team0 (unregistering): Port device team_slave_1 removed [ 1127.555543] team0 (unregistering): Port device team_slave_0 removed [ 1127.591405] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1127.659416] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1127.728624] bond0 (unregistering): Released all slaves 20:56:52 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) write$evdev(r0, &(0x7f0000000000)=[{{}, 0x1, 0x74, 0x2}], 0x10) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000180), 0x103ffff7f) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r2, r1, &(0x7f0000000040), 0xfff) [ 1128.889260] bridge0: port 1(bridge_slave_0) entered blocking state [ 1128.895745] bridge0: port 1(bridge_slave_0) entered disabled state [ 1128.903273] device bridge_slave_0 entered promiscuous mode [ 1128.950685] bridge0: port 2(bridge_slave_1) entered blocking state [ 1128.957185] bridge0: port 2(bridge_slave_1) entered disabled state [ 1128.964663] device bridge_slave_1 entered promiscuous mode [ 1129.009852] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1129.054564] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1129.192486] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1129.241702] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1129.459245] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1129.466586] team0: Port device team_slave_0 added [ 1129.494814] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1129.502014] team0: Port device team_slave_1 added [ 1129.532284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1129.572189] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1129.618314] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1129.625637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1129.643509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1129.665221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1130.186299] bridge0: port 2(bridge_slave_1) entered blocking state [ 1130.192711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1130.199413] bridge0: port 1(bridge_slave_0) entered blocking state [ 1130.205767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1130.213745] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1130.987459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1131.706817] device bridge_slave_1 left promiscuous mode [ 1131.714418] bridge0: port 2(bridge_slave_1) entered disabled state [ 1131.769559] device bridge_slave_0 left promiscuous mode [ 1131.775035] bridge0: port 1(bridge_slave_0) entered disabled state [ 1133.779725] team0 (unregistering): Port device team_slave_1 removed [ 1133.790026] team0 (unregistering): Port device team_slave_0 removed [ 1133.800450] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1133.842949] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1133.909227] bond0 (unregistering): Released all slaves [ 1134.687153] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1134.845838] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1135.002633] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1135.009244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1135.025167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1135.181112] 8021q: adding VLAN 0 to HW filter on device team0 20:57:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xcb, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:00 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:57:00 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x6d, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:00 executing program 2: ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000340)=""/205) socket$inet6(0xa, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$sock_netdev_private(r0, 0x89f4, &(0x7f00000000c0)="15") sendfile(r0, r1, &(0x7f0000000000), 0x800000bf) getgroups(0x0, &(0x7f0000001a80)) prlimit64(0x0, 0x0, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)) geteuid() 20:57:00 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001540)={0x0}, &(0x7f0000001580)=0xc) sched_setscheduler(r0, 0x0, &(0x7f00000015c0)) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r1, &(0x7f0000000400)=""/4096, 0x1000) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r2], 0x6f69c8ad6d338911) 20:57:00 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000140)={{0x0, @broadcast, 0x4e24, 0x4, "72820000000000000000000700", 0x37, 0xc3, 0x4c}, {@local, 0x4e24, 0x0, 0x0, 0x0, 0x7f}}, 0x44) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000040)) ioctl$EVIOCGSND(r0, 0x80084504, 0xffffffffffffffff) 20:57:00 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:57:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1135.957869] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1135.982871] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1136.060019] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:00 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:57:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="736d617073009223300ed429bc1629a3904cd7e9657f400b8dd19fcb5a8d61fa1cde666e59bea345efc705e61e5f77f53a36137a6d9b860000000000000000000000000000000000") r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0x6}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x200031, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000400)) pread64(r1, &(0x7f0000000000), 0x0, 0x800000000000) [ 1136.107911] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1136.230848] IPVS: ftp: loaded support on port[0] = 21 [ 1136.292788] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1136.352364] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x104, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:00 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:57:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000ffffffff00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:00 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb000c0000000000000000199ac0f1ca89a8015b9a745e"], &(0x7f0000000000)) [ 1136.601806] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1136.630493] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1137.112678] bridge0: port 1(bridge_slave_0) entered blocking state [ 1137.119311] bridge0: port 1(bridge_slave_0) entered disabled state [ 1137.126263] device bridge_slave_0 entered promiscuous mode [ 1137.153997] bridge0: port 2(bridge_slave_1) entered blocking state [ 1137.160450] bridge0: port 2(bridge_slave_1) entered disabled state [ 1137.167462] device bridge_slave_1 entered promiscuous mode [ 1137.195453] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1137.223347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1137.301286] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1137.331138] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1137.359511] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1137.366325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1137.393971] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1137.401035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1137.477917] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1137.486052] team0: Port device team_slave_0 added [ 1137.511956] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1137.520562] team0: Port device team_slave_1 added [ 1137.546634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1137.575997] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1137.603635] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1137.611058] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1137.619581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1137.644765] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1137.652745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1137.661437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1137.920498] bridge0: port 2(bridge_slave_1) entered blocking state [ 1137.926940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1137.933680] bridge0: port 1(bridge_slave_0) entered blocking state [ 1137.940136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1137.947663] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1138.368997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1138.880231] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1138.971779] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1139.070149] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1139.076302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1139.084146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1139.173399] 8021q: adding VLAN 0 to HW filter on device team0 20:57:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) sendto(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) keyctl$describe(0xf, 0x0, &(0x7f0000000240)=""/140, 0x8c) 20:57:03 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x23e, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:03 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:57:03 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:03 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x77, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:03 executing program 5: r0 = socket$inet6(0xa, 0x201000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_eeprom={0x33}}) getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001740)={&(0x7f0000000380)={0x50, 0x0, 0xe, 0x0, 0x0, 0x0, {0x2, 0x0, 0xa}, [@generic, @nested={0x20, 0x66, [@typed={0x14, 0x11, @ipv6=@mcast1}, @typed={0x8, 0x0, @str='#\x00'}]}, @typed={0x8, 0x67, @fd=r0}, @typed={0x14, 0x1a, @ipv6=@remote}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x4) 20:57:04 executing program 5: perf_event_open(&(0x7f0000000280)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000240)) msgsnd(0x0, &(0x7f0000000380), 0x8, 0x800) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x2) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000200)) shmdt(0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x6}, 0x10) 20:57:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:04 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) [ 1139.784381] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1139.816856] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) clone(0x2102011ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000001340), 0xffffffffffffffff) r1 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000100)={[], 0x0, 0x9, 0x6, 0x100000001}) 20:57:04 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000440)) getpgid(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000140)="6bc444458f8b20dd65ad30f8fc6de6fa0e8aae529e4ab3a90d2428889fc7fb8f2b74f180453cc2f2768b203a56582e30479e324466d1c0c2ddacf3c56f806a32487d05ae6f20b04b0efa5b45", 0x4c, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x1f) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x2}, 0x68) 20:57:04 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000540)) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) dup(0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x1c) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$BINDER_SET_MAX_THREADS(r0, 0xc0046209, 0x0) timer_gettime(0x0, &(0x7f0000000180)) 20:57:04 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x178}}) [ 1139.988947] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1140.051190] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:04 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1a9, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="736563757269747900000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) socket$packet(0x11, 0x3, 0x300) 20:57:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1140.093024] binder: 30222:30223 ioctl c0046209 0 returned -22 [ 1140.124065] binder: 30222:30228 ioctl c0046209 0 returned -22 [ 1140.236301] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1140.300313] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x11, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:04 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x178}}) 20:57:04 executing program 5: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000080)={0x2, 0x404e23, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000008c0)=0x7fe, 0xfd9e) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) r1 = dup2(r0, r0) sendmsg$nl_netfilter(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) write(r0, &(0x7f0000002640)="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", 0x595) 20:57:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) write$FUSE_STATFS(r1, &(0x7f0000000000)={0x60, 0x0, 0x8}, 0x60) 20:57:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1140.412167] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:04 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x178}}) 20:57:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2e155}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1140.453686] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:04 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000480)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r3 = inotify_init() syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0xf6e9, 0x202) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_WAITACTIVE(r3, 0x5607) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000788000), 0x4) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(r4, &(0x7f00000001c0)=[{}, {}, {}], 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) socket(0x13, 0x80807, 0x0) getgroups(0x0, &(0x7f0000000180)) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000180), 0x0, 0xfffffffffffffffb) pwritev(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) sendfile(r5, r5, &(0x7f0000000000), 0x2000005) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb}, 0x2c) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) sendfile(r6, r2, &(0x7f0000000040), 0x100000001) creat(&(0x7f0000000180)='./file0\x00', 0x0) 20:57:05 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x22c, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:05 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e}}) 20:57:05 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)) ioctl$RTC_AIE_ON(r0, 0x7001) io_submit(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x81, r0, &(0x7f0000000080)="2e42c771e6532ec6ab9e77ad2593fcd834996a468dff7039bf93f3af140e9d09d48598715c65483da76a24971688348f715924f6d106311e1887384a6d305f060704d5b8006315f0c7fffe66b01b3b8835c56ac6872472c8aa2478bbeba48b07b5949357dc61be5ac34a3e06e1d52357d8f374428dfe356673180e2a31c520fbe417cc2b247f", 0x86, 0x3ff, 0x0, 0x0, r0}]) 20:57:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x75, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:05 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e}}) 20:57:05 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e}}) [ 1141.037890] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1141.047206] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1141.072201] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000080)=ANY=[], 0x0) socket$packet(0x11, 0x0, 0x300) 20:57:05 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)) ioctl$RTC_AIE_ON(r0, 0x7001) io_submit(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x81, r0, &(0x7f0000000080)="2e42c771e6532ec6ab9e77ad2593fcd834996a468dff7039bf93f3af140e9d09d48598715c65483da76a24971688348f715924f6d106311e1887384a6d305f060704d5b8006315f0c7fffe66b01b3b8835c56ac6872472c8aa2478bbeba48b07b5949357dc61be5ac34a3e06e1d52357d8f374428dfe356673180e2a31c520fbe417cc2b247f", 0x86, 0x3ff, 0x0, 0x0, r0}]) [ 1141.093655] rtc_cmos 00:00: Alarms can be up to one day in the future 20:57:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:05 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x15, 0x0, 0x1ff}}) [ 1141.245564] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1141.254979] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1141.277359] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1141.353718] rtc_cmos 00:00: Alarms can be up to one day in the future 20:57:05 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1bb, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='statm\x00') 20:57:05 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)) ioctl$RTC_AIE_ON(r0, 0x7001) io_submit(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x81, r0, &(0x7f0000000080)="2e42c771e6532ec6ab9e77ad2593fcd834996a468dff7039bf93f3af140e9d09d48598715c65483da76a24971688348f715924f6d106311e1887384a6d305f060704d5b8006315f0c7fffe66b01b3b8835c56ac6872472c8aa2478bbeba48b07b5949357dc61be5ac34a3e06e1d52357d8f374428dfe356673180e2a31c520fbe417cc2b247f", 0x86, 0x3ff, 0x0, 0x0, r0}]) 20:57:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) mprotect(&(0x7f000022d000/0x4000)=nil, 0x4000, 0x300000c) fcntl$setlease(r0, 0x400, 0x3) getpeername(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000000c0)=0x80) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x5}, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='statm\x00') 20:57:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x9b, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:05 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)) ioctl$RTC_AIE_ON(r0, 0x7001) io_submit(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x81, r0, &(0x7f0000000080)="2e42c771e6532ec6ab9e77ad2593fcd834996a468dff7039bf93f3af140e9d09d48598715c65483da76a24971688348f715924f6d106311e1887384a6d305f060704d5b8006315f0c7fffe66b01b3b8835c56ac6872472c8aa2478bbeba48b07b5949357dc61be5ac34a3e06e1d52357d8f374428dfe356673180e2a31c520fbe417cc2b247f", 0x86, 0x3ff, 0x0, 0x0, r0}]) [ 1141.649735] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1141.683518] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:05 executing program 2: [ 1141.707799] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1141.740599] rtc_cmos 00:00: Alarms can be up to one day in the future 20:57:06 executing program 4: [ 1141.802722] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:06 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:06 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)) ioctl$RTC_AIE_ON(r0, 0x7001) [ 1141.967667] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1141.982012] rtc_cmos 00:00: Alarms can be up to one day in the future 20:57:06 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x70, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:06 executing program 2: 20:57:06 executing program 4: 20:57:06 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 20:57:06 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:06 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x137, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:06 executing program 2: 20:57:06 executing program 4: [ 1142.300555] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1142.316182] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:06 executing program 5: ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 20:57:06 executing program 5: ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 20:57:06 executing program 4: 20:57:06 executing program 2: 20:57:07 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:07 executing program 2: 20:57:07 executing program 5: ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 20:57:07 executing program 4: 20:57:07 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x151, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x132, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:07 executing program 2: [ 1142.951239] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:07 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 20:57:07 executing program 4: 20:57:07 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:07 executing program 2: 20:57:07 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 20:57:07 executing program 4: [ 1143.221746] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:07 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:07 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 20:57:07 executing program 4: [ 1143.428120] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:07 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x77, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x9, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:07 executing program 2: 20:57:07 executing program 4: 20:57:07 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:07 executing program 5: 20:57:08 executing program 5: 20:57:08 executing program 4: [ 1143.812396] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:08 executing program 2: 20:57:08 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:08 executing program 4: 20:57:08 executing program 2: [ 1144.067906] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:08 executing program 4: 20:57:08 executing program 5: 20:57:08 executing program 2: 20:57:08 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:08 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x153, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:08 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x45, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:08 executing program 4: 20:57:08 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:08 executing program 5: [ 1144.379860] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:08 executing program 2: [ 1144.497412] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:08 executing program 4: 20:57:08 executing program 5: 20:57:08 executing program 2: 20:57:08 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:08 executing program 2: 20:57:09 executing program 5: [ 1144.764167] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:09 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xba, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:09 executing program 4: 20:57:09 executing program 2: 20:57:09 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:09 executing program 5: 20:57:09 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xa7, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:09 executing program 2: 20:57:09 executing program 5: [ 1145.151432] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:09 executing program 4: 20:57:09 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:09 executing program 2: 20:57:09 executing program 5: [ 1145.317781] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:09 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x59, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:09 executing program 4: 20:57:09 executing program 2: 20:57:09 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000ffffffff00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:09 executing program 5: 20:57:09 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1b1, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:10 executing program 2: 20:57:10 executing program 5: [ 1145.741738] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:10 executing program 4: 20:57:10 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:10 executing program 2: 20:57:10 executing program 5: [ 1145.941928] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:10 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10b, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:10 executing program 4: 20:57:10 executing program 2: 20:57:10 executing program 5: 20:57:10 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:10 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xfe, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:10 executing program 4: 20:57:10 executing program 2: 20:57:10 executing program 5: [ 1146.442925] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:10 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:10 executing program 2: 20:57:10 executing program 4: [ 1146.670568] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:11 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xc, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:11 executing program 5: 20:57:11 executing program 4: 20:57:11 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:11 executing program 2: 20:57:11 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x3b, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:11 executing program 2: 20:57:11 executing program 4: [ 1147.100697] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:11 executing program 5: 20:57:11 executing program 2: 20:57:11 executing program 4: 20:57:11 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1147.364504] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:11 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x198, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:11 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x2000, &(0x7f0000fff000/0x1000)=nil) 20:57:11 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)) 20:57:11 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000280)={0x0, {}, {{0x2, 0x4e20}}}, 0x108) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000000)={0x0, 0x110000}) socket$netlink(0x10, 0x3, 0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000279, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/if_inet6\x00') ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000003c0)=0x5) preadv(r1, &(0x7f0000000480), 0x1000000000000157, 0x4c004800) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000040)={0x9, 0x5, 0x4000, 0xf7, &(0x7f0000000180)=""/247, 0x1000, &(0x7f0000000480)=""/4096, 0x6c, &(0x7f00000002c0)=""/108}) syz_open_procfs(0x0, &(0x7f0000000440)='net/ip_vs_stats\x00') 20:57:11 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x29, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000080)={@loopback={0x200000000000000}}, 0x4b) 20:57:11 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000feffff0700"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1147.718862] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:12 executing program 2: mknod(&(0x7f0000000180)='./file1\x00', 0x40, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000400), &(0x7f0000000b40)) 20:57:12 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000280)={0x0, {}, {{0x2, 0x4e20}}}, 0x108) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000000)={0x0, 0x110000}) socket$netlink(0x10, 0x3, 0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000279, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/if_inet6\x00') ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000003c0)=0x5) preadv(r1, &(0x7f0000000480), 0x1000000000000157, 0x4c004800) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000040)={0x9, 0x5, 0x4000, 0xf7, &(0x7f0000000180)=""/247, 0x1000, &(0x7f0000000480)=""/4096, 0x6c, &(0x7f00000002c0)=""/108}) syz_open_procfs(0x0, &(0x7f0000000440)='net/ip_vs_stats\x00') 20:57:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="736d617073009223300ed429bc1629a3904cd7e9657f400b8dd19fcb5a8d61fa1cde666e59bea345efc705e61e5f77f53a36137a6d9b860000000000000000000000000000000000") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x200031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000000), 0x0, 0x800000000000) [ 1147.933031] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:12 executing program 5: 20:57:12 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x23a, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:12 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:12 executing program 5: 20:57:12 executing program 4: 20:57:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) write$FUSE_STATFS(r1, &(0x7f0000000000)={0x60}, 0xf) [ 1148.386402] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:12 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1c5, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:12 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) 20:57:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xb, 0x82000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x14) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x20011, r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000001c0), &(0x7f00000000c0)}, 0x20) 20:57:12 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:12 executing program 2: 20:57:12 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) 20:57:12 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1148.578318] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1148.666757] binder_alloc: binder_alloc_mmap_handler: 30784 20001000-20004000 already mapped failed -16 [ 1148.720054] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:13 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1de, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:13 executing program 2: 20:57:13 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) 20:57:13 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:13 executing program 5: 20:57:13 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1a, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:13 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) 20:57:13 executing program 5: 20:57:13 executing program 2: [ 1149.094223] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:13 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:13 executing program 2: 20:57:13 executing program 5: r0 = socket(0x2, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000000eff4)) epoll_wait(r1, &(0x7f000000affb)=[{}], 0x1, 0xfffffffffffffef7) shutdown(r0, 0x1) shutdown(r0, 0x0) [ 1149.381277] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:13 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x5aa, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:13 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) 20:57:13 executing program 2: sched_setaffinity(0x0, 0xffffffffffffffb1, &(0x7f0000000180)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 20:57:13 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:13 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000001000)='/dev/vcsa#\x00', 0x1ff, 0x0) read$FUSE(r0, &(0x7f0000002a40), 0x1000) 20:57:13 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x214, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:13 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x6f69c8ad6d338911) 20:57:14 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x0) [ 1149.746464] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:14 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x6f69c8ad6d338911) 20:57:14 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) 20:57:14 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x6a, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1149.936779] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:14 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x6f69c8ad6d338911) 20:57:14 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[], 0x0) 20:57:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd25d766070") syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) [ 1150.114612] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:14 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1150.331470] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:14 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xa8, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:14 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) 20:57:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='maps\x00') pread64(r1, &(0x7f0000000000), 0x0, 0x800000000000) 20:57:14 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_nanosleep(0x0, 0x9, &(0x7f0000000340), 0x0) 20:57:14 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:14 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) read(0xffffffffffffffff, &(0x7f0000000400)=""/4096, 0x1000) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32=r0], 0x6f69c8ad6d338911) [ 1150.522344] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:14 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xdc, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:14 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004003}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 20:57:14 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000140)=0x4) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000001c0)="b7da122b891bfc4e", 0x8) [ 1150.699148] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) 20:57:15 executing program 2: perf_event_open(&(0x7f00000000c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/144, 0x90) 20:57:15 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x5c, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:15 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:15 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) 20:57:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000140)=0x4) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000001c0)="b7da122b891bfc4e", 0x8) 20:57:15 executing program 2: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_nanosleep(0x9, 0x0, &(0x7f0000000340), 0x0) [ 1151.209922] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:15 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x100000000, 0x0, 0x0, 0x0, 0x0, 0xc8}, 0x401, 0xfffffffffffffff9, 0x6d7, 0x2, 0x0, 0x0, 0x2b8a}) 20:57:15 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x22e, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:15 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:15 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) 20:57:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f00000003c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) [ 1151.548230] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:15 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f00000015c0), 0x1000) ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000080)) 20:57:16 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:16 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1fb, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:16 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) [ 1151.963778] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:16 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000300), 0x0) 20:57:17 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x235, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_nanosleep(0x9, 0x9, &(0x7f0000000340), 0x0) 20:57:17 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x18e, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:17 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0x6}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x200031, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000400)) 20:57:17 executing program 5: clock_nanosleep(0x9, 0x9, &(0x7f0000000340), 0x0) 20:57:17 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x50000000) 20:57:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0x6}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000400)) 20:57:17 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(0xffffffffffffffff, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) [ 1153.593048] IPVS: ftp: loaded support on port[0] = 21 20:57:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="736d617073009223300ed429bc1629a3904cd7e9657f400b8dd19fcb5a8d61fa1cde666e59bea345efc705e61e5f77f53a36137a6d9b860000000000000000000000000000000000") mount(&(0x7f00002b9ff8), &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x0, &(0x7f000002f000)) pread64(r1, &(0x7f0000000000), 0x0, 0x800000000000) 20:57:17 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setpriority(0x2, 0x0, 0x0) [ 1153.709421] device bridge_slave_1 left promiscuous mode [ 1153.714983] bridge0: port 2(bridge_slave_1) entered disabled state 20:57:18 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x158, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1153.789783] device bridge_slave_0 left promiscuous mode [ 1153.795343] bridge0: port 1(bridge_slave_0) entered disabled state 20:57:18 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x124, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1153.931974] IPVS: ftp: loaded support on port[0] = 21 [ 1154.012125] team0 (unregistering): Port device team_slave_1 removed [ 1154.051469] team0 (unregistering): Port device team_slave_0 removed [ 1154.094505] bond0 (unregistering): Releasing backup interface bond_slave_1 20:57:18 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1bb, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1154.154929] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1154.281999] bond0 (unregistering): Released all slaves 20:57:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) fallocate(r1, 0x3, 0x0, 0x8001) ftruncate(r1, 0x0) 20:57:18 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0xfe9e) fcntl$setstatus(r1, 0x4, 0x100000000046c00) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 20:57:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x9288) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) fallocate(r1, 0x3, 0x0, 0x8001) [ 1155.652145] bridge0: port 1(bridge_slave_0) entered blocking state [ 1155.669300] bridge0: port 1(bridge_slave_0) entered disabled state [ 1155.679909] device bridge_slave_0 entered promiscuous mode [ 1155.769895] bridge0: port 2(bridge_slave_1) entered blocking state [ 1155.776352] bridge0: port 2(bridge_slave_1) entered disabled state [ 1155.800022] device bridge_slave_1 entered promiscuous mode [ 1155.871887] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1155.943105] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1156.017484] bridge0: port 1(bridge_slave_0) entered blocking state [ 1156.024208] bridge0: port 1(bridge_slave_0) entered disabled state [ 1156.032177] device bridge_slave_0 entered promiscuous mode [ 1156.099242] bridge0: port 2(bridge_slave_1) entered blocking state [ 1156.109325] bridge0: port 2(bridge_slave_1) entered disabled state [ 1156.116757] device bridge_slave_1 entered promiscuous mode [ 1156.151946] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1156.178531] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1156.199549] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1156.260813] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1156.412288] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1156.472520] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1156.484695] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1156.492281] team0: Port device team_slave_0 added [ 1156.523139] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1156.530147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1156.548307] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1156.556354] team0: Port device team_slave_1 added [ 1156.580064] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1156.587269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1156.606351] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1156.613883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1156.625688] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1156.668307] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1156.717777] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1156.725670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1156.742545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1156.759566] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1156.766982] team0: Port device team_slave_0 added [ 1156.778583] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1156.786561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1156.796494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1156.830589] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1156.837854] team0: Port device team_slave_1 added [ 1156.890184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1156.939383] device bridge_slave_1 left promiscuous mode [ 1156.944915] bridge0: port 2(bridge_slave_1) entered disabled state [ 1156.989748] device bridge_slave_0 left promiscuous mode [ 1156.995221] bridge0: port 1(bridge_slave_0) entered disabled state [ 1157.059588] team0 (unregistering): Port device team_slave_1 removed [ 1157.069637] team0 (unregistering): Port device team_slave_0 removed [ 1157.080892] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1157.122670] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1157.181823] bond0 (unregistering): Released all slaves [ 1157.236249] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1157.280573] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1157.287709] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1157.300683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1157.340497] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1157.347658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1157.356404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1157.657217] bridge0: port 2(bridge_slave_1) entered blocking state [ 1157.663664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1157.671018] bridge0: port 1(bridge_slave_0) entered blocking state [ 1157.677409] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1157.691816] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1158.185800] bridge0: port 2(bridge_slave_1) entered blocking state [ 1158.192274] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1158.199026] bridge0: port 1(bridge_slave_0) entered blocking state [ 1158.205435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1158.213212] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1158.438913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1158.449752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1159.966900] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1160.127310] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1160.250107] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1160.297823] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1160.304412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1160.329593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1160.431583] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1160.467237] 8021q: adding VLAN 0 to HW filter on device team0 [ 1160.592933] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1160.599505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1160.606524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1160.764418] 8021q: adding VLAN 0 to HW filter on device team0 20:57:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:25 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x93, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:25 executing program 5: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)) [ 1161.518173] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1161.528056] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1161.580523] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1161.597124] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:26 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) 20:57:26 executing program 2: perf_event_open(&(0x7f0000000280)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000240)) msgsnd(0x0, &(0x7f0000000380), 0x8, 0x800) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x2) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000200)) shmdt(0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)) 20:57:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x144, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:26 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xa2f}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 20:57:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000de2ff4), 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1400000004010503000000000000009100000000"], 0x14}}, 0x0) [ 1161.870354] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:26 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) 20:57:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000de2ff4), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000040105030000000000000015e64fdca2"], 0x14}}, 0x0) read(r0, &(0x7f0000000040)=""/138, 0x8a) [ 1161.953420] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000ffffffff00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1162.066264] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1162.079270] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:26 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x172, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:26 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) 20:57:26 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) 20:57:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mount$bpf(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000540)='bpf\x00', 0x800000, &(0x7f0000003d40)={[{@mode={'mode'}}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003e80)='./cgroup/syz1\x00', 0x1ff) gettid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x100000, &(0x7f0000000400)=ANY=[@ANYBLOB]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000640)) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f007e574d7a0f30809022cfde26555dc9ecfe1974406ee8d38364782d63b6612854b2e49dbdcaef718197e37e870a308b1e0900000088a46d3025ef933e51828ab675064e2afdff126423b49c6db2f160d49cb6cce76c27289a4f9d0ad81ed8da324e446371ef1e75097354aaa5860d2383df87526baa184d90bb7729366c17bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289eb8e140377aa6fb31700f138dc4d7e08d57c282a67de5a75c5471f81000000000000009b539817dba77f4b93cfe72d195c491fb62764fc6592e06dd0a7f63abbd4c6e32f5fa19f6e4dc074d824fc7c698040c7e8b27136fad57e628942b469ee47685c9422bfc1992a4c76a4a39126d21402b9672d2aa0f89b042ca898252d1e25f84c01be87d48c9d9c0d39fb231dd7c0e645811663ea4eb8fb06d20107c79eb1855875c976e538e6e3f316c48803254d33ec3d6384ebc2b087fd62a9a4e6d8e5ea712f1ebc57ec2b", 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) [ 1162.204454] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1162.242504] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xc7, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:26 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) 20:57:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:26 executing program 5: r0 = memfd_create(&(0x7f00000000c0)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) write(r0, &(0x7f0000000180)="a8", 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000317000), 0xff8) utimensat(r0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f00000001c0), 0x100) 20:57:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mount$bpf(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000540)='bpf\x00', 0x800000, &(0x7f0000003d40)={[{@mode={'mode'}}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003e80)='./cgroup/syz1\x00', 0x1ff) gettid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x100000, &(0x7f0000000400)=ANY=[@ANYBLOB]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000640)) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="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", 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 20:57:26 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) [ 1162.551068] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1162.624678] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:26 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) 20:57:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1162.771479] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1162.823830] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:27 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x6f69c8ad6d338911) 20:57:27 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:27 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1cb, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x111, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @broadcast}]}, 0x20}}, 0x0) [ 1162.943593] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1163.024921] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:27 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x176, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:27 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[], 0x0) 20:57:27 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'lo\x00'}) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000000000c000000000000000800010073667100480002000000000000000000000040ef7e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x8}, 0x0) 20:57:27 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[], 0x0) 20:57:27 executing program 2: clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000003180)) process_vm_readv(0x0, &(0x7f00000045c0)=[{&(0x7f0000003340)=""/95, 0xfffffffffffffd53}], 0x1, &(0x7f0000004640)=[{&(0x7f0000000700)=""/135, 0x87}, {&(0x7f00000007c0)=""/229, 0xe5}, {&(0x7f00000009c0)=""/107, 0x6b}, {&(0x7f0000000340)=""/59, 0x3b}], 0x4, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000380)) [ 1163.251652] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1163.299127] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:27 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000040), 0x3) 20:57:27 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) truncate(&(0x7f0000000380)='./file0\x00', 0x0) 20:57:27 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) write$P9_RGETLOCK(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x6f69c8ad6d338911) [ 1163.464611] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1163.493275] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:27 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x74, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:27 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000ffb000/0x4000)=nil) 20:57:27 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x3d, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:27 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:27 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/206, 0xce) chmod(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = dup2(r0, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r3 = getpid() ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000001280)) sched_setscheduler(r3, 0x5, &(0x7f0000000200)) ioctl$KDSETLED(r2, 0x8916, 0x0) 20:57:27 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000240)) msgsnd(0x0, &(0x7f0000000380), 0x8, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000200)) shmdt(0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)) 20:57:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) get_robust_list(0x0, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f00000000c0)={&(0x7f0000000000)}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000240)=0x18) r2 = dup2(r1, r0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) semget$private(0x0, 0x3, 0x129) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0xb) 20:57:28 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000240)) msgsnd(0x0, &(0x7f0000000380), 0x8, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000200)) shmdt(0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)) 20:57:28 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x0, 0x451, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x47e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000280)={0x0, {}, {{0x2, 0x4e20}}}, 0x108) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000000)={0x0, 0x110000}) socket$netlink(0x10, 0x3, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000279, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='net/if_inet6\x00') ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000003c0)=0x5) preadv(r4, &(0x7f0000000480), 0x1000000000000157, 0x4c004800) pipe2(&(0x7f0000000000), 0x84000) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000040)={0x9, 0x5, 0x4000, 0xf7, &(0x7f0000000180)=""/247, 0x1000, &(0x7f0000000480)=""/4096, 0x6c, &(0x7f00000002c0)=""/108}) syz_open_procfs(0x0, &(0x7f0000000440)='net/ip_vs_stats\x00') 20:57:28 executing program 2: getsockname(0xffffffffffffff9c, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x80) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000ffb000/0x4000)=nil) [ 1163.800617] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:28 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1163.867179] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:28 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000240)) msgsnd(0x0, &(0x7f0000000380), 0x8, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000200)) shmdt(0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)) [ 1164.063195] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:28 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x221, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:28 executing program 2: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$setperm(0x5, r0, 0x0) keyctl$describe(0xf, r0, &(0x7f0000000240)=""/140, 0x8c) [ 1164.170167] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:28 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x16b, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:28 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000240)) msgsnd(0x0, &(0x7f0000000380), 0x8, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000200)) shmdt(0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)) 20:57:28 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000080), 0x492492492492758, 0x0) r2 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) 20:57:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x1) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x7a04, &(0x7f0000000240)=ANY=[]) umount2(&(0x7f0000000700)='./file0\x00', 0x2) [ 1164.490527] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:28 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1164.579883] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1164.614863] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:28 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x0, 0x451, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x47e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000280)={0x0, {}, {{0x2, 0x4e20}}}, 0x108) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000000)={0x0, 0x110000}) socket$netlink(0x10, 0x3, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000279, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='net/if_inet6\x00') ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000003c0)=0x5) preadv(r4, &(0x7f0000000480), 0x1000000000000157, 0x4c004800) pipe2(&(0x7f0000000000), 0x84000) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000040)={0x9, 0x5, 0x4000, 0xf7, &(0x7f0000000180)=""/247, 0x1000, &(0x7f0000000480)=""/4096, 0x6c, &(0x7f00000002c0)=""/108}) syz_open_procfs(0x0, &(0x7f0000000440)='net/ip_vs_stats\x00') 20:57:28 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000feffff0700"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:28 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x0, 0x451, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x47e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000280)={0x0, {}, {{0x2, 0x4e20}}}, 0x108) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000000)={0x0, 0x110000}) socket$netlink(0x10, 0x3, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000279, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='net/if_inet6\x00') ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000003c0)=0x5) preadv(r4, &(0x7f0000000480), 0x1000000000000157, 0x4c004800) pipe2(&(0x7f0000000000), 0x84000) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000040)={0x9, 0x5, 0x4000, 0xf7, &(0x7f0000000180)=""/247, 0x1000, &(0x7f0000000480)=""/4096, 0x6c, &(0x7f00000002c0)=""/108}) syz_open_procfs(0x0, &(0x7f0000000440)='net/ip_vs_stats\x00') 20:57:28 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1164.695891] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1164.705701] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:29 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x56, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:29 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x15d, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:29 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x0, 0x451, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x47e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000280)={0x0, {}, {{0x2, 0x4e20}}}, 0x108) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000000)={0x0, 0x110000}) socket$netlink(0x10, 0x3, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000279, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='net/if_inet6\x00') ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000003c0)=0x5) preadv(r4, &(0x7f0000000480), 0x1000000000000157, 0x4c004800) pipe2(&(0x7f0000000000), 0x84000) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000040)={0x9, 0x5, 0x4000, 0xf7, &(0x7f0000000180)=""/247, 0x1000, &(0x7f0000000480)=""/4096, 0x6c, &(0x7f00000002c0)=""/108}) syz_open_procfs(0x0, &(0x7f0000000440)='net/ip_vs_stats\x00') 20:57:29 executing program 2: semop(0x0, &(0x7f0000000180)=[{0x0, 0x0, 0x1800}], 0x1) 20:57:29 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)=ANY=[], 0x0) 20:57:30 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)=ANY=[], 0x0) 20:57:30 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)=ANY=[], 0x0) 20:57:30 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)=ANY=[], 0x0) 20:57:30 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:30 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) 20:57:30 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) 20:57:30 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1166.391892] IPVS: ftp: loaded support on port[0] = 21 [ 1166.422630] device bridge_slave_1 left promiscuous mode [ 1166.428202] bridge0: port 2(bridge_slave_1) entered disabled state 20:57:30 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xb8, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:30 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@local}, &(0x7f00000000c0)=0x14) r1 = getpid() ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd25d766070") timer_create(0xffbffffffffffff0, &(0x7f0000000380)={0x0, 0x20}, &(0x7f0000000180)) clock_getres(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f00000000c0)={{}, {0x0, r1}}, 0x0) 20:57:30 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:30 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1d3, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:30 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@local}, &(0x7f00000000c0)=0x14) r1 = getpid() ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1166.470270] device bridge_slave_0 left promiscuous mode [ 1166.475811] bridge0: port 1(bridge_slave_0) entered disabled state 20:57:30 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@local}, &(0x7f00000000c0)=0x14) r1 = getpid() ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:30 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@local}, &(0x7f00000000c0)=0x14) r1 = getpid() ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:30 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@local}, &(0x7f00000000c0)=0x14) getpid() ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1166.732792] team0 (unregistering): Port device team_slave_1 removed 20:57:31 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@local}, &(0x7f00000000c0)=0x14) getpid() timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1166.781547] team0 (unregistering): Port device team_slave_0 removed 20:57:31 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@local}, &(0x7f00000000c0)=0x14) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1166.855619] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1166.905382] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1167.048206] bond0 (unregistering): Released all slaves [ 1167.870637] bridge0: port 1(bridge_slave_0) entered blocking state [ 1167.877129] bridge0: port 1(bridge_slave_0) entered disabled state [ 1167.885155] device bridge_slave_0 entered promiscuous mode [ 1167.931026] bridge0: port 2(bridge_slave_1) entered blocking state [ 1167.937528] bridge0: port 2(bridge_slave_1) entered disabled state [ 1167.945647] device bridge_slave_1 entered promiscuous mode [ 1167.992618] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1168.038385] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1168.200452] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1168.250340] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1168.296416] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1168.303750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1168.429299] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1168.436770] team0: Port device team_slave_0 added [ 1168.478060] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1168.485634] team0: Port device team_slave_1 added [ 1168.512720] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1168.571305] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1168.614300] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1168.621390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1168.629771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1168.654787] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1168.661891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1168.669895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1168.930208] bridge0: port 2(bridge_slave_1) entered blocking state [ 1168.936571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1168.943277] bridge0: port 1(bridge_slave_0) entered blocking state [ 1168.949669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1168.957012] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1169.119011] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1169.875141] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1169.964970] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1170.053455] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1170.059851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1170.066836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1170.158274] 8021q: adding VLAN 0 to HW filter on device team0 20:57:34 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:34 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:34 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1dc, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:34 executing program 5: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@local}, &(0x7f00000000c0)=0x14) r1 = getpid() ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:34 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:34 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x8a, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:34 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:34 executing program 5: 20:57:35 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:35 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1170.809242] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1170.838704] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:35 executing program 5: perf_event_open(&(0x7f0000000280)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000240)) msgsnd(0x0, &(0x7f0000000380)=ANY=[], 0x0, 0x0) mq_open(&(0x7f0000000140)='\x00', 0x1, 0x100, &(0x7f00000001c0)={0x2, 0x0, 0x3, 0x5, 0x7, 0x0, 0x0, 0x8}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000200)) shmdt(0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x6}, 0x10) 20:57:35 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000080)=ANY=[], 0x0) 20:57:35 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) [ 1171.037322] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1171.082162] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:35 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xa2, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:35 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:35 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:35 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x40305828, 0x0) select(0x40, &(0x7f0000000080)={0x7, 0x0, 0x80000001, 0x0, 0x5, 0x0, 0x800000000000000}, &(0x7f00000000c0)={0x20, 0x0, 0x0, 0x10001, 0x6, 0x6}, &(0x7f0000000100)={0xff, 0x0, 0x0, 0x401, 0x0, 0x0, 0xfff}, &(0x7f0000000140)) 20:57:35 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x173, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:35 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:35 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1171.225918] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:35 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:35 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:35 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x200100, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000180)=""/27) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000000)={@broadcast, @rand_addr, @loopback}, 0xc) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) [ 1171.288894] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:35 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:35 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) [ 1171.452893] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1171.579348] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:36 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xe, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:36 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xfc) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1_to_bond\x00', 0x10) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:36 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:36 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x8d, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:36 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:36 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:36 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) [ 1171.830967] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1171.869909] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1171.968185] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:36 executing program 4: write(0xffffffffffffffff, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1172.029981] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1172.134281] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:36 executing program 4: write(0xffffffffffffffff, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1172.190703] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:36 executing program 4: write(0xffffffffffffffff, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000feffff0700"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:36 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xee, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:36 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:36 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1bc, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:36 executing program 5: 20:57:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:36 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:36 executing program 5: 20:57:36 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1172.667358] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1172.694871] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:36 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:37 executing program 5: [ 1172.850296] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:37 executing program 2: ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) [ 1172.911491] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:37 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x3a, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:37 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0bcbb42fe7d1cac2de0a2ac10a227215111cfda0f5da7859c1c642728f507011eba", 0x85) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:37 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1e9, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:37 executing program 5: 20:57:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:37 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:37 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440), 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:37 executing program 5: [ 1173.351514] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:37 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440), 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1173.420447] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000ffffffff00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:37 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:37 executing program 5: [ 1173.636878] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1173.677038] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:38 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xc0, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:38 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440), 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:38 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x194, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:38 executing program 5: 20:57:38 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x0, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:38 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:38 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa9", 0x43) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:38 executing program 5: 20:57:38 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa9", 0x43) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1174.039390] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:38 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) [ 1174.098190] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:38 executing program 5: 20:57:38 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1174.285899] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:38 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x107, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:38 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa9", 0x43) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:38 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xb7, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:38 executing program 5: 20:57:38 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x0, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:38 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:38 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990c280a0a51026fdf0", 0x64) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:38 executing program 5: 20:57:38 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa9", 0x43) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1174.664836] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:39 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0x0, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:39 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xd4, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:39 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:39 executing program 5: 20:57:39 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x0, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) [ 1174.946421] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:39 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xa9, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:39 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa9", 0x43) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:39 executing program 5: 20:57:39 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:39 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x0, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:39 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x212, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:39 executing program 5: [ 1175.346168] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:39 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa9", 0x43) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:39 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:39 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:39 executing program 5: 20:57:39 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f", 0x54) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1175.580379] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:40 executing program 5: 20:57:40 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x0, &(0x7f0000000140)}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:40 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f", 0x44) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:40 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x42, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:40 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x49, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:40 executing program 5: 20:57:40 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:40 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f", 0x44) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1176.030678] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:40 executing program 5: [ 1176.096117] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:40 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f", 0x44) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:40 executing program 5: 20:57:40 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) [ 1176.377017] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:40 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908", 0x4c) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:40 executing program 5: 20:57:40 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x21, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:40 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:40 executing program 5: 20:57:40 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908", 0x4c) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:40 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x63, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1176.768292] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:41 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:41 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908", 0x4c) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:41 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:41 executing program 5: 20:57:41 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3b", 0x50) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:41 executing program 5: 20:57:41 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x176, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:41 executing program 5: 20:57:41 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908", 0x4c) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:41 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908", 0x4c) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:42 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1d4, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:42 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908", 0x4c) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:42 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:42 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c4", 0x4e) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1178.436697] IPVS: ftp: loaded support on port[0] = 21 20:57:43 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:43 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908", 0x4c) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:43 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1a0, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:43 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x228, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:43 executing program 5: 20:57:43 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908", 0x4c) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:43 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908", 0x4c) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:43 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5", 0x4d) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1179.179510] device bridge_slave_1 left promiscuous mode [ 1179.185224] bridge0: port 2(bridge_slave_1) entered disabled state [ 1179.210815] IPVS: ftp: loaded support on port[0] = 21 [ 1179.260060] device bridge_slave_0 left promiscuous mode [ 1179.265787] bridge0: port 1(bridge_slave_0) entered disabled state [ 1179.312522] IPVS: ftp: loaded support on port[0] = 21 20:57:43 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908", 0x4c) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1179.416295] team0 (unregistering): Port device team_slave_1 removed [ 1179.461505] team0 (unregistering): Port device team_slave_0 removed 20:57:43 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x17f, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1179.513946] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1179.596070] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1179.684786] bond0 (unregistering): Released all slaves [ 1181.110052] bridge0: port 1(bridge_slave_0) entered blocking state [ 1181.116569] bridge0: port 1(bridge_slave_0) entered disabled state [ 1181.124210] device bridge_slave_0 entered promiscuous mode [ 1181.226923] bridge0: port 2(bridge_slave_1) entered blocking state [ 1181.238997] bridge0: port 2(bridge_slave_1) entered disabled state [ 1181.249569] device bridge_slave_1 entered promiscuous mode [ 1181.376917] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1181.435365] bridge0: port 1(bridge_slave_0) entered blocking state [ 1181.441950] bridge0: port 1(bridge_slave_0) entered disabled state [ 1181.449794] device bridge_slave_0 entered promiscuous mode [ 1181.458344] bridge0: port 1(bridge_slave_0) entered blocking state [ 1181.481308] bridge0: port 1(bridge_slave_0) entered disabled state [ 1181.489850] device bridge_slave_0 entered promiscuous mode [ 1181.500009] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1181.527259] bridge0: port 2(bridge_slave_1) entered blocking state [ 1181.542252] bridge0: port 2(bridge_slave_1) entered disabled state [ 1181.551452] device bridge_slave_1 entered promiscuous mode [ 1181.561118] bridge0: port 2(bridge_slave_1) entered blocking state [ 1181.567525] bridge0: port 2(bridge_slave_1) entered disabled state [ 1181.577590] device bridge_slave_1 entered promiscuous mode [ 1181.657002] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1181.687539] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1181.733721] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1181.765156] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1181.831123] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1181.908010] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1182.007364] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1182.089810] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1182.112652] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1182.182058] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1182.199394] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1182.206304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1182.229310] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1182.242733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1182.276185] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1182.284247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1182.773520] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1182.780829] team0: Port device team_slave_0 added [ 1182.788131] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1182.798805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1183.067458] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1183.076250] team0: Port device team_slave_1 added [ 1183.372402] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1183.398200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1183.417079] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1183.673820] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1183.681625] team0: Port device team_slave_0 added [ 1183.690867] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1183.698386] team0: Port device team_slave_0 added [ 1183.707047] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1183.716910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1183.737181] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1183.987200] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1183.994995] team0: Port device team_slave_1 added [ 1184.006669] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1184.016495] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1184.032306] team0: Port device team_slave_1 added [ 1184.038232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1184.060418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1184.309869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1184.321130] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1184.328630] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1184.347053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1184.364052] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1184.372498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1184.381757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1184.390805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1184.399415] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1184.535702] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1184.543018] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1184.552418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1184.579027] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1184.599537] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1184.607615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1184.736008] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1184.755016] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1184.763499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1184.789333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1184.806311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1184.817239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1184.944272] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1184.954700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1184.970024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1184.978871] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1184.986481] device bridge_slave_1 left promiscuous mode [ 1185.001978] bridge0: port 2(bridge_slave_1) entered disabled state [ 1185.059828] device bridge_slave_0 left promiscuous mode [ 1185.065419] bridge0: port 1(bridge_slave_0) entered disabled state [ 1185.100204] device bridge_slave_1 left promiscuous mode [ 1185.106348] bridge0: port 2(bridge_slave_1) entered disabled state [ 1185.149747] device bridge_slave_0 left promiscuous mode [ 1185.155755] bridge0: port 1(bridge_slave_0) entered disabled state [ 1187.242244] team0 (unregistering): Port device team_slave_1 removed [ 1187.253505] team0 (unregistering): Port device team_slave_0 removed [ 1187.265837] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1187.313438] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1187.380971] bond0 (unregistering): Released all slaves [ 1187.442668] team0 (unregistering): Port device team_slave_1 removed [ 1187.454300] team0 (unregistering): Port device team_slave_0 removed [ 1187.465459] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1187.522845] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1187.592440] bond0 (unregistering): Released all slaves [ 1187.662630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1187.671621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1188.392219] bridge0: port 2(bridge_slave_1) entered blocking state [ 1188.398823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1188.405528] bridge0: port 1(bridge_slave_0) entered blocking state [ 1188.412178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1188.433052] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1188.442877] bridge0: port 2(bridge_slave_1) entered blocking state [ 1188.449781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1188.456500] bridge0: port 1(bridge_slave_0) entered blocking state [ 1188.463122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1188.473875] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1188.581285] bridge0: port 2(bridge_slave_1) entered blocking state [ 1188.587873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1188.595058] bridge0: port 1(bridge_slave_0) entered blocking state [ 1188.601642] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1188.616295] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1188.669306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1188.676816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1188.695219] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1191.704596] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1191.761537] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1191.810260] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1191.991681] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1192.001901] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1192.029238] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1192.237342] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1192.244484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1192.254360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1192.264961] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1192.276680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1192.286734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1192.303189] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1192.309753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1192.317126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1192.515448] 8021q: adding VLAN 0 to HW filter on device team0 [ 1192.533988] 8021q: adding VLAN 0 to HW filter on device team0 [ 1192.552706] 8021q: adding VLAN 0 to HW filter on device team0 20:57:58 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x183, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:58 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908", 0x4c) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:58 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:58 executing program 5: 20:57:58 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:58 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xa0, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:58 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) [ 1194.054177] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1194.062882] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:58 executing program 5: 20:57:58 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:58 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908", 0x4c) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1194.202851] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:58 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:58 executing program 5: [ 1194.250998] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1194.448136] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1194.522902] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:58 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xcb, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:58 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:58 executing program 5: 20:57:58 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5", 0x4d) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:58 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:58 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xd2, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:58 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:59 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:59 executing program 5: [ 1194.752158] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:59 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5", 0x4d) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1194.848143] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:59 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1195.024835] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1195.072681] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:59 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x230, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:59 executing program 5: 20:57:59 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:59 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5", 0x4d) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:57:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:59 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x66, &(0x7f00000011c0)}}], 0x249, 0x0) 20:57:59 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:59 executing program 5: [ 1195.329283] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:59 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:57:59 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5", 0x4d) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x10, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1195.385852] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:57:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:57:59 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_setscheduler(r1, 0x0, &(0x7f0000000040)) getdents64(r0, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) [ 1195.599276] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1195.640914] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:00 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1a4, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:00 executing program 5: 20:58:00 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5", 0x4d) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x10, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:58:00 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 20:58:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1ec, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:00 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) [ 1195.937739] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:00 executing program 5: 20:58:00 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5", 0x4d) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x10, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:58:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1195.987500] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:00 executing program 5: 20:58:00 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x2, 0x0, {}, {0x9, 0x5}, @period={0x0, 0x7, 0xd176, 0x1, 0x6, {0x0, 0x6f}, 0x1, &(0x7f0000000140)=[0x0]}}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) [ 1196.089502] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1196.121586] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:00 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1e1, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:00 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5", 0x4d) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:58:00 executing program 2: 20:58:00 executing program 5: 20:58:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x197, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:00 executing program 5: [ 1196.536855] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:00 executing program 2: 20:58:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:00 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5", 0x4d) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1196.614324] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:00 executing program 5: 20:58:01 executing program 2: [ 1196.877739] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1196.927596] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:01 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xd5, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:01 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5", 0x4d) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:58:01 executing program 2: 20:58:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:01 executing program 5: 20:58:01 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x166, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:01 executing program 2: [ 1197.215972] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:01 executing program 5: 20:58:01 executing program 2: [ 1197.301667] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:01 executing program 4: 20:58:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:01 executing program 5: [ 1197.486981] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1197.596733] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:02 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x164, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:02 executing program 2: 20:58:02 executing program 4: 20:58:02 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:02 executing program 5: 20:58:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xf8, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:02 executing program 2: 20:58:02 executing program 5: [ 1197.880252] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:02 executing program 4: 20:58:02 executing program 2: 20:58:02 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1197.969267] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:02 executing program 2: [ 1198.063397] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:02 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1f0, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:02 executing program 5: 20:58:02 executing program 4: 20:58:02 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:02 executing program 2: 20:58:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1d8, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1198.450743] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:02 executing program 4: 20:58:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000100)=0x24) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) 20:58:02 executing program 5: 20:58:02 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:02 executing program 4: [ 1198.685063] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:02 executing program 2: 20:58:03 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xe6, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:03 executing program 5: 20:58:03 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000feffff0700"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:03 executing program 4: 20:58:03 executing program 2: 20:58:03 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x20e, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:03 executing program 2: [ 1199.124956] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:03 executing program 4: 20:58:03 executing program 5: 20:58:03 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:03 executing program 2: 20:58:03 executing program 4: [ 1199.516342] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:03 executing program 2: 20:58:03 executing program 5: 20:58:03 executing program 4: 20:58:03 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:03 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1d2, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:03 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x194, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:03 executing program 2: [ 1199.749027] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:04 executing program 5: 20:58:04 executing program 4: 20:58:04 executing program 2: 20:58:04 executing program 4: 20:58:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:04 executing program 5: 20:58:04 executing program 2: 20:58:04 executing program 5: [ 1200.039773] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:04 executing program 4: 20:58:04 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x226, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:04 executing program 2: 20:58:04 executing program 5: 20:58:04 executing program 4: 20:58:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x156, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:04 executing program 4: [ 1200.641006] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:04 executing program 2: 20:58:04 executing program 5: 20:58:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:05 executing program 4: 20:58:05 executing program 2: [ 1200.944918] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:05 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xef, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:05 executing program 5: 20:58:05 executing program 4: 20:58:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:05 executing program 2: 20:58:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x15f, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:05 executing program 5: 20:58:05 executing program 4: 20:58:05 executing program 2: [ 1201.368950] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:05 executing program 4: 20:58:05 executing program 2: [ 1201.529813] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:06 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x16, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:06 executing program 5: 20:58:06 executing program 4: 20:58:06 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:06 executing program 2: 20:58:06 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x92, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:06 executing program 2: 20:58:06 executing program 4: [ 1202.011555] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:06 executing program 5: 20:58:06 executing program 4: 20:58:06 executing program 5: 20:58:06 executing program 2: 20:58:06 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x16d, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:06 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:06 executing program 5: 20:58:06 executing program 4: 20:58:06 executing program 2: 20:58:06 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x78, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:06 executing program 4: 20:58:06 executing program 5: 20:58:06 executing program 2: [ 1202.654237] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:07 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000ffffffff00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x22000000) 20:58:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x2, 0x317f, 0x1, 0x800000005}, 0x2c) 20:58:07 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x193, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{&(0x7f0000001680)=@nfc, 0x41d, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1, &(0x7f00000017c0)=""/116, 0x74}}], 0x1, 0x0, &(0x7f0000004a40)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) 20:58:07 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd25d766070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e24, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r2, &(0x7f0000008180)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/13}, {&(0x7f0000000080)=""/31}, {&(0x7f0000000100)=""/34}, {&(0x7f0000000580)=""/216}, {&(0x7f00000003c0)=""/217}, {&(0x7f00000004c0)=""/175}], 0x0, &(0x7f00000007c0)=""/160, 0xa0}}], 0x234, 0x8802, &(0x7f00000083c0)={0x77359400}) writev(r2, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 20:58:07 executing program 5: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5", 0x4d) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:58:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x65, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:07 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x194, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:07 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xc7, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:08 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:08 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xdc, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:08 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x178}}) 20:58:08 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x12, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:08 executing program 4: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001440)={[{@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") [ 1204.203521] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1204.238529] IPVS: ftp: loaded support on port[0] = 21 [ 1204.311710] device bridge_slave_1 left promiscuous mode [ 1204.317296] bridge0: port 2(bridge_slave_1) entered disabled state [ 1204.348128] ISOFS: Invalid session number or type of track 20:58:08 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x8, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:08 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x207, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1204.367351] ISOFS: Invalid session number [ 1204.373380] device bridge_slave_0 left promiscuous mode [ 1204.381471] bridge0: port 1(bridge_slave_0) entered disabled state [ 1204.488827] ISOFS: Unable to identify CD-ROM format. [ 1204.747914] team0 (unregistering): Port device team_slave_1 removed 20:58:09 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1ab, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1204.821277] team0 (unregistering): Port device team_slave_0 removed [ 1204.851269] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1204.935937] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1205.113901] bond0 (unregistering): Released all slaves 20:58:09 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x4, &(0x7f0000000240)="003426f44d28cfc2cd0000") fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000000c0)=0x1) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000200000002000000e0007edb7c83c5e9508a00000800120002000200000000007d2200001800ff0003030000ff3f0000000400000000001f03000000160000000301000000001500000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 20:58:09 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x207, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:09 executing program 4: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x30, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:09 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x23c, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1206.933583] bridge0: port 1(bridge_slave_0) entered blocking state [ 1206.940443] bridge0: port 1(bridge_slave_0) entered disabled state [ 1206.947956] device bridge_slave_0 entered promiscuous mode [ 1206.993081] bridge0: port 2(bridge_slave_1) entered blocking state [ 1206.999980] bridge0: port 2(bridge_slave_1) entered disabled state [ 1207.007438] device bridge_slave_1 entered promiscuous mode [ 1207.052797] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1207.097746] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1207.234676] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1207.283402] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1207.444591] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1207.453215] team0: Port device team_slave_0 added [ 1207.496614] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1207.504160] team0: Port device team_slave_1 added [ 1207.531475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1207.562200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1207.592474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1207.634320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1207.921159] bridge0: port 2(bridge_slave_1) entered blocking state [ 1207.927569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1207.934299] bridge0: port 1(bridge_slave_0) entered blocking state [ 1207.940683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1207.948648] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1208.758933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1208.923946] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1209.017052] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1209.109932] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1209.116124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1209.128292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1209.212848] 8021q: adding VLAN 0 to HW filter on device team0 20:58:14 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x66, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:14 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x4, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:14 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:14 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x157, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:14 executing program 2: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xbc45, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000140)="92be162d7fa13ccd013cc517df101b68fdc6aec99be1a16049321f5bb2aea71ad1e93a898792d4a9fcd505a9409ac1bcc6f5709d1d7b9fa5570c530b174e39ff44ad7a43bf13a3a0e8b266aa8c3efb1ac49eb40d21b38130d5fe0f91f600598143a7f9a98a7c62c19ed4178143e70831112b958d9f0e661da7f13bda7e0af9e3916a8f73b9d13d74aed85a7f10b0436406d0212651bda8", 0x97, 0x20}, {&(0x7f00000002c0)="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", 0x1000, 0x100000001}, {&(0x7f0000000200)="f0d603cdfa90dde8148ad3bbe2f7038dfaba8d216de3", 0x16, 0x2}], 0x1800080, &(0x7f0000001440)={[{@uid={'uid'}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}, {@norock='norock'}]}) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:58:14 executing program 4: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x30, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1209.768482] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1209.778309] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1209.833757] ISOFS: Invalid session number or type of track [ 1209.908882] ISOFS: Invalid session number [ 1209.981480] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:14 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1210.025354] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1210.035400] ISOFS: Unable to identify CD-ROM format. [ 1210.216177] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1210.277149] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:14 executing program 2: socket$key(0xf, 0x3, 0x2) r0 = geteuid() syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xbc45, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000140)="92be162d7fa13ccd013cc517df101b68fdc6aec99be1a16049321f5bb2aea71ad1e93a898792d4a9fcd505a9409ac1bcc6f5709d1d7b9fa5570c530b174e39ff44ad7a43bf13a3a0e8b266aa8c3efb1ac49eb40d21b38130d5fe0f91f600598143a7f9a98a7c62c19ed4178143e70831112b958d9f0e661da7f13bda7e0af9e3916a8f73b9d13d74aed85a7f10b0436406d0212651bda8", 0x97, 0x20}, {&(0x7f00000002c0)="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", 0x1000, 0x100000001}, {&(0x7f0000000200)="f0d603cdfa90dde8148ad3bbe2f7038dfaba8d216de3", 0x16, 0x2}], 0x1800080, &(0x7f0000001440)={[{@uid={'uid', 0x3d, r0}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid'}}, {@gid={'gid'}}, {@mode={'mode', 0x3d, 0x1ff}}, {@norock='norock'}]}) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 20:58:14 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:14 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1e6, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1210.500130] ISOFS: Invalid session number or type of track [ 1210.518976] ISOFS: Invalid session number [ 1210.581102] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1210.591665] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:14 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1210.629752] ISOFS: Unable to identify CD-ROM format. 20:58:15 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x106, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1210.810593] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1210.848618] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:15 executing program 4: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x30, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:15 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1b5, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:15 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:15 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x157, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:15 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1211.160915] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1211.174825] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1211.227416] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = geteuid() getresuid(&(0x7f0000000240)=0x0, &(0x7f0000001340), &(0x7f0000001380)) fstat(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xbc45, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000140)="92be162d7fa13ccd013cc517df101b68fdc6aec99be1a16049321f5bb2aea71ad1e93a898792d4a9fcd505a9409ac1bcc6f5709d1d7b9fa5570c530b174e39ff44ad7a43bf13a3a0e8b266aa8c3efb1ac49eb40d21b38130d5fe0f91f600598143a7f9a98a7c62c19ed4178143e70831112b958d9f0e661da7f13bda7e0af9e3916a8f73b9d13d74aed85a7f10b0436406d0212651bda8", 0x97, 0x20}, {&(0x7f00000002c0)="5fce4b9e602ad3246e07be84451a9876265bec360bd748a5683e1d1fda40f2c2592900e523b25e5e1df9aa27b0d191fc105e55889af84a342d103f4b184aed59b9235b0aa422d7c3f2f3f96e7bd2010566525252eb8e9b9fbd09aa266240c8df36a5835804eb1b0dd74ac57b27ab8a4f6db321e6a0f7ce867d83f3947eb2f74e876763d05478444fafbef12331a76d754e0cb16c1aa05c582eb9ac408bbffab792ac8392cb5ae3d1a29737adb8793db7561d60e016d1377c500e781ebadf89f56e67bbc67df7cf87ba8739a663d7fc61900abec9ee98c8dc17d1319c3cc1a9d69a7617b5587490865193c2e7b3aa5e6ea50c2c2712b8803373dc7bd16b922de80e7b6b48aba485a38e02cab47c42a655562e80c9177d9ecd3d913cc91d7dfbb12bd58d5b8e770b8a203b4578784ce04feb81f2f07fb3cd81424f817f38adc5b0c83d36aa9894f960e71fec56e9671704728de03498e2252a58bfb79f8dd4e912f518ee4e77b070399c45237766d0ff8f4b8633be79117b71cb491a42a9804c98eb4ca91ac667574f880b75463945cd314320625d88a9d85be23483b1806b9f822008750067b8a97accbca0f6701dba6cf2586902d927c6b2b81521e3804510d0756c4ae082539e39b91626572ed54786bb1c3157a81e5819bad9e3ec550af2cd4bcb93455cc242c4b21c7b7236fe7d70cb0a133531f719e793a59fda36ecaaa31b204fec3bb55869e5d987081066acf187c3888dfb2cd55ba29d94c1b4d6c4e9fd50d80b45793e3da255127fb026ae0ddcc1632d6af494b27c5c16c382722f72b97af5acc2bd277b5a9dce922f7c12cc81ea64876740e89aefdc52168c7da377d2be2c415f6b0794311743fdba254a0f6de24ff926c056d977b964feb8599359b94b6b5770d86f986a7670ca143a7d5df741d44413109c8560c7568d90279f86559e2a077f606ccb4fdca3fe84817106d5735b618f0257678376e3033639fdf01176b16dedf5349dfc7d91488f0b957d849753ead851d91cbcadaba4092624cfee1fed85cfed6e07d8abfd1593c38040dafc38ade6b81b707e5e5d073131b50f1c4e9ddf8f15c9bb7fca52585373a401c17c0166be7332a8775ef841e7995c1a59428a0684cbb48fe3dc44f798b13854f4bb19c7a40e56550ed4f14f415afc4983f476bba2fb7ae6453e43c96ee1e0d57fe6a2076443f09a58d56e39245c642047ed320f2cede4769db990cf5832d2f9a6538743befe3944266ee0607ab5d776e5fb3ddd71324b7714bc32dd4a99a97edbac3beb0a3e59b2e7ecf5a978d9eb459b2deb6cd90c7183a44d1d3ff5a72b111436d3c3e9a58bc58a067c31d26d93671ec3c2d311003cf3aca7ee4ad336c9487645342b7f686600e617c03ac9dca381c92eb21a522fa1612731f3e5ead75767ef517c762ea849513c5b5d7d813245a14950fd9f659033e72d1f55cd25eb9ea7688651770655c781d1a1aed29d63441a6e0c5c83b95cacebbe9eb526172e1f17378a993224dde46e69c7c899018a7e832087017689e6d308728a46284dbecac7549729a8b2bbe30d8be51979b61985fcf5ced3ddbdbdacd674dfdd7ea0d14eebe3d07a2e3c01498714317a45a51d1bd0497e5ecdbdfc3bdc9a38ee918629c3b4374828a8d106e4c7d32a80b5507a0c63f9d058fea832bab34fb67f24258aa66d3000b453adc1a76060f663a9bc981ffed04077322ef039bcdcce0436571d7d00496ebde99467d9b4ac11a5a6a366908394e29da503ef01d17657e2d475463a9bc29e72c62aeeb501297dbf830c895ead061a58fcd69b73982de05ae1fef2381b14a5b18ca2bdf8b65e10228b0722dbaf1e1af43e6c3af2c4ff62ea3ede32e1c8b1c2f735d4937868996942bf4c3bfe0e372410692092e5bc1a66dc5b5c81cb59805835e72fa5575167cf91785a03cee716f176b9bd7b7763d8dd3d6ced5b1a4778f6359150ef6524356c20c418fceca72e6dd6fff9f0912d63582913f6dd720f8b634503db13514ab08c882feb827247a8ae04caa44cec2a0617f4ef96314f8b499bd8bd4199cc1288bef0a3818aabed5a6210e1409238451af0c5bcdb8f91c5515784353168355f2bbd2e7fec2e9362fc874c2e1bdfdeee71deefef404ce56b2fd0cea7e35ca2e9be6c005bae618cd6c8ae0a4cd39b72594f46bcb42b389b72e3d9de41a16160fe9fa9112c4f915957ded778c38cdeb0a45d4c5bf6c2d06b52f5524573a7d23ad9dbbf9db31a81b3abf664dc496475f59f9a8c4f2c97a4a3ee5fb49b3e1269e3211877e35e8ea22314a97ef79b78628c8471bc9db664f8ab376d67697d0e84fd480487b0dacf32758953d57aeeeefcdb24c2eb9338f338142332c8a0fadcde5ffbf42cf22b9d756192978cd9cfeaae1cc4d4f6b4d6eeb64ac7ded257b7868859770f1f90ab091c2d455a1d79957aed7041f1663d9075cf768ebed4904ce28a194c7695356bd9f75fdb43b02541326c44cf98194fb5a8afe3cbab242f1e34ffa6b219f1943f694cb0de3c87ce76d99d10f29f3d9026e654cebcd67d01b80d7afcd250b2f0794c4a366bb35a0c0c31db1e3dcca3e0694acc91a2c59cc10c2b66935db602f3fe5d5253003492f84962a8a4b130be9312f9551d7549692a06381a771e1c5a105bb6f551aa08b7b071d9860111017259e150c7bd37ba5b0a9a597018ea959348a4d93fa8c95261a6d6b70148fcabeec58e0cb1fb274b4a0a4f826665748e04aae073f1464b484231c18dc19b7a61d1874fac68cee2eacd74097441008393666f0ed9bd9d60b9558b1432feeb31544c8b7e062464a63b8fafc985e011a5ad122b558d6177a4fc94d38a3d74b77da5a0a82c484b07eb3f89b4015583b7f55b21493a381bf68b7aafefd46a212aadc90ee12b70b9d8fa7a14450f10a6b098b090e112b09142291fe65e424a46bf16c3166ecc08de0f88c337903d75663b4afbfb22cc97de2e8d2a12cbdcec0a54043ca5f2334b42be82d0023adba60492621d31194274862be52354b5fda2ab74c665d90e3b9352683484e7f851d33a84a1bb139fa873aa1e9c0f321e977809157637f08a0b7545929d1b98d44da9f2da24bc48a1e010c05cf28b27946fc57706ff01dd31428417dfa5ffe380442a71e2b3f1452f16f2cf7d7760e269ec6b01c57140301dd30784f40ac822d29a993047efb804265bb17cadb77cb57e9dc66105d390414a1e8da284a96c9c8fb0689d6faca998cb46a1a9dd9e7719599eb071488cec10f737f082e2d55ed166765cc39839cd5ab9ea479efe3217f3aabffd81e7a1ffed2156e1262000feb03241cc649236abf98147c368ba5339e878c2aaba36d3634ab1cb7c7aaad9b25a3000dc93bc6df6d0e45c80fb21fa0a9f791379b6f632a0ae57ff9643420163250cc3789e7ec47955525b86cabe1b8f90f32a2df27851449b7ce975054de438d03f49fd0b67cb792aefe75dc845c72f13e137f64da40be2505b9b352d35a55bb62ecc893c9623591139e737d6c1e85caf555aca2c82e4254b2780ddb00737d26b7cc25d84ec5a0588d5f713af4d466c6ef88a9be22df2dd7e93330daca3f901870500042bd693d73b21be10d3edcdeb9e5e1c710317d17e31e778ae6f8bc86bec22cedfb0f5dbf25b1fd0f48ee39b2beae6997447f5ed8559d9c00fab4439c1c6bc309f0e2695b42a43aeb759cb1c94d23a70b584e238d75425c993ca54f9ddede9ce4662af91f5ad85e9e673062489a22e9a210640867bd7fb551558f69b0f4faf8aba294fa7c281c00890d96c61e7c167570938b541dbe8215b3a965381531fce6991683c734d676814c7a39377f704ad2b54510fa3706c5e3b291c4b16c969ef873c88afc13cfb92cf21611359f911b4d178fe03fbfd684dcc399f0b45cf550129954fcd3df8c4f49a2bfc4c176af102f5cb72fa234b90934a3ca54c69df41bba17d7607e93b7f5ea3f3699e2e2095f7ca780a2bd871097da6d5f078edb16ce2888d54b70916ae47da482ce7ecabd4d88dcfa422350c102e2655e998abbdfd8480c9bb37aef2acb58a3cbc63c1ef3f638292a5e1b7d6fe48d0503c0238b92482a30d25308bd0a29ac6737069cb12368b9a3f8eee9ba1ece4766cc84965f6ef188a5eba400ee035c243f3148a0d8eba0fac0ba2cb4e94e3d7a22fb0d96b121a0334bc9c6f613b5c30e5c4f4ea8c6acbe17923c83ba0befe32e58f717d45d1270489be10bf067455c8de374a1656b5437d693e32bb506f94fb29126462767e06d52c70f6c27d504fc4d497f8bb9ad6c3802e1c0ea112d974ae699f79e185e7aa3b0001323d744e3a77f113816c7c7dc078b2ef2182ea3a961a94d1290ffae54f6281070e2e85e9aaf0b57c97d8d59c06c7adb50f39dd543d2e258a5064ba5727973512bbff28bee10742d5a2300519b6882063f7ae152c85dfc236e0b56548f44068ae6838b9f3f8bc59a43e09eed61740f4a724f6aebdb81a4935ff39d5b734056b4a356ae1f7c0bdd9045063744fdd888dd253a7c567b9f6d1ef384d4cd44beaafbb31377f78d8928ffbfacd6e3d4c8bb8b89ed546b56026c3b018eec77a549a28dbd359314d43e81858959606e800c12590ff963bdd6fabde372de625a665cd37928dd97dd1309c8b027fc64a38e65ddf6526389d6572abfe6aea790eb9a52d12965881ee7a4189750c32f0d88a95d68f5211d6aee0ad75a10d5f9836e56c48b43b9ee2bee6cc663cf5e483090b9921da7f0a092bed37772a5587dda82a9e305cfd834d31a248d75a22d767ceab591d62a70cdf4ab8522c44e7210c0f46d55705966ae0e9948b29d32bd50fd6fb3fbeb873d941aac2709e92491d2bba5ab9a0ce495e2e0d5d059262751debe4aa90c2d40f6d6b76f226e712c39dfb2171d35d524909029a711c44338e53f93d8c38ce7d549de90e7ec1a9e2cbfe338692c0ef99dee92aa6e850269a3319e400fe05eed9b6ca6ffb1d32b954e1a1fb8cf6018a1fdfd00d7770a0b39ef2c13a74e0b511d8da5edb6e61a9d3cc3cdcead8653b1a197bd48773fa955870f35476e4da9b1e50dad2f940edac2718e78a78c2ff8e1f94a011174a04a88bacec24b54d7a63d686e7f6ef5253e1f679a1575b020fe1c591d142885a7bb20b0e221022b46cabcd4c6a9e9626a650b176d3035d4f79e7591e95e5802e8430443fc5549d89d0bf88462618541b80af1ffafc3bcff4265dc0c5c6a15e2b54b3251b2a22f3c8c1216756de833b824a8b2a1db2dad7430c41c6d4900f962958f968bcb4f3a215d7f9f4c149f71e2f2051de7a1343b84232cca07ce58d56dc073a1a4d21d4ec099ed3b596bdd498e75e03995c996dee9c350470390f20ab66bcda0cbda444164a6a7f8f5d73879674306772a3d7400e0ebfca65cc0a11dd5446f338cec7094b2825f1f4d2b7511a3dd320590888e21cf03974c3fa2433044783d5c47fae7d9160c2c1b3af94374cf5baaf86c3d9d24a5bb2479b6813c174c083f06cf8f867a293e86dc02bb709dfeecd27b176f99c1fdc5999bd64a5ec8d10682fc6bea9c4dce7e44f76ab2f6c9461dbfad1529e5d8b83f61874c3e509d73ae8e7ec14df7f44db8d473840d0d0cd4c62ccde7aa307ca1d67f17e64d92bb4decb22e64cf51aa9839c29a46ee1705a4e7c843d4fdec003e9eb2fff8a2c2ae1b3bb49240a50221ab382f18513552737194da6cd646b4c8f47c33ea1fef5ece2f5ecf1650f798551982df8d880a67a979d8da3edcf5aa066871ec8d1d86776210891749a00f6d07d9a", 0x1000, 0x100000001}, {&(0x7f0000000200)="f0d603cdfa90dde8148ad3bbe2f7038dfaba8d216de3", 0x16, 0x2}], 0x1800080, &(0x7f0000001440)={[{@uid={'uid', 0x3d, r1}}, {@session={'session', 0x3d, 0x51}}, {@unhide='unhide'}, {@uid={'uid', 0x3d, r2}}, {@gid={'gid', 0x3d, r3}}, {@mode={'mode', 0x3d, 0x1ff}}, {@norock='norock'}]}) socket$l2tp(0x18, 0x1, 0x1) 20:58:15 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1211.489804] ISOFS: Invalid session number or type of track [ 1211.514574] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1211.529139] ISOFS: Invalid session number 20:58:15 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1211.610340] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1211.635844] ISOFS: Unable to identify CD-ROM format. [ 1211.867685] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:16 executing program 4: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xbb, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 1211.934592] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:16 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:16 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1ae, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_trie\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x8, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x5, 0x0, 0x0, 0xf614, 0x0, 0xfffffffffffff800, 0x100000001, 0x4, 0xed, 0x8001, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8001}, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x4040}, 0x0, 0x0, 0xffffffffffffffff, 0x1) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 1212.082658] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1212.130771] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:16 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1fa, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:16 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) [ 1212.348487] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1212.403700] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:16 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_trie\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x8, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x5, 0x0, 0x0, 0xf614, 0x0, 0xfffffffffffff800, 0x100000001, 0x4, 0xed, 0x8001, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8001}, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x4040}, 0x0, 0x0, 0xffffffffffffffff, 0x1) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 20:58:16 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x182, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1212.610801] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:16 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1212.687247] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1212.903609] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1212.995558] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:17 executing program 4: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xbb, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:17 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1213.290261] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 20:58:17 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x167, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:17 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:17 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10f, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:18 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x182, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 20:58:18 executing program 4: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xbb, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 20:58:18 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xf3, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 20:58:19 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x845, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x40, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:58:19 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 20:58:19 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xe4, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000002c0)) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000000)) 20:58:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7da122b891bfc4e2f00000000000000", 0x10) 20:58:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x4004556d, &(0x7f0000000080)) 20:58:19 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)=""/198, &(0x7f0000000080)=0xc6) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) futex(&(0x7f0000000140), 0x1, 0x0, &(0x7f0000000100), &(0x7f0000000280), 0x0) 20:58:19 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x24f) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) [ 1215.592360] IPVS: ftp: loaded support on port[0] = 21 [ 1215.599923] device bridge_slave_1 left promiscuous mode [ 1215.612066] bridge0: port 2(bridge_slave_1) entered disabled state 20:58:19 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) rename(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') link(&(0x7f00000001c0)='./file0/file1\x00', &(0x7f0000000200)='./file0/file0\x00') unlink(&(0x7f0000000040)='./file0/file0\x00') [ 1215.695278] device bridge_slave_0 left promiscuous mode [ 1215.701905] bridge0: port 1(bridge_slave_0) entered disabled state 20:58:19 executing program 2: 20:58:19 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x22, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:20 executing program 2: [ 1215.873263] team0 (unregistering): Port device team_slave_1 removed [ 1215.911623] team0 (unregistering): Port device team_slave_0 removed [ 1215.947737] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1215.995837] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1216.294927] bond0 (unregistering): Released all slaves [ 1217.141573] bridge0: port 1(bridge_slave_0) entered blocking state [ 1217.148031] bridge0: port 1(bridge_slave_0) entered disabled state [ 1217.156330] device bridge_slave_0 entered promiscuous mode [ 1217.204897] bridge0: port 2(bridge_slave_1) entered blocking state [ 1217.211423] bridge0: port 2(bridge_slave_1) entered disabled state [ 1217.219609] device bridge_slave_1 entered promiscuous mode [ 1217.264485] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1217.310373] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1217.455724] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1217.505454] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1217.552696] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1217.559924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1217.696884] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1217.704192] team0: Port device team_slave_0 added [ 1217.734377] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1217.741944] team0: Port device team_slave_1 added [ 1217.786216] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1217.831158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1217.860626] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1217.867857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1217.877670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1217.912141] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1217.919400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1217.927438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1218.211786] bridge0: port 2(bridge_slave_1) entered blocking state [ 1218.218164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1218.224906] bridge0: port 1(bridge_slave_0) entered blocking state [ 1218.231299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1218.238629] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1218.398878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1219.206728] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1219.296006] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1219.387401] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1219.393799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1219.414160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1219.499892] 8021q: adding VLAN 0 to HW filter on device team0 20:58:24 executing program 2: 20:58:24 executing program 5: 20:58:24 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1a9, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='net/sockstat\x00') dup2(r0, r1) 20:58:24 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x95, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:24 executing program 2: ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000240)={{0x0, 0x3, 0x6}, 0x0, 0x0, 'id1\x00', 'timer0\x00', 0x0, 0x0, 0xffffffffffff8001, 0x0, 0x8}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000004c0)={{0x0, 0x0, 0xfffffffe00, 0x0, 0x1f}, 0x0, 0x0, 'id1\x00', 'timer1\x00', 0x0, 0xf9, 0x0, 0x1, 0x80}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000680)={{0xffffffffffffffff, 0x2, 0x81}, 0x0, 0x0, 'id1\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x0, 0x7f}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x24f) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000005c0)=""/24, 0x18) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000340)=""/40, &(0x7f00000001c0)=0x28) [ 1220.044780] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1220.054190] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:24 executing program 5: 20:58:24 executing program 4: 20:58:24 executing program 2: [ 1220.230167] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:24 executing program 5: 20:58:24 executing program 4: 20:58:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1220.313727] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:24 executing program 2: [ 1220.479764] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1220.564555] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:24 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x157, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000080), 0x0) 20:58:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000005140)=[{{&(0x7f0000000080)=@un=@abs, 0x80, &(0x7f0000000540)}}], 0x1, 0x0) 20:58:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:25 executing program 2: 20:58:25 executing program 5: 20:58:25 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x5a, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:25 executing program 4: 20:58:25 executing program 2: [ 1220.880982] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:25 executing program 5: accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000026c0)=0x14, 0x0) r0 = gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='attr/current\x00') exit(0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) prlimit64(r0, 0x0, &(0x7f0000000040)={0x7, 0x2}, 0x0) 20:58:25 executing program 4: r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='#!\b'], 0x3) execveat(r0, &(0x7f0000000140)='\x00', &(0x7f00000001c0), &(0x7f0000000080), 0x1000) 20:58:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1220.930418] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1221.092153] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:25 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x14f, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:25 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f0000000240)='posix_acl_accesswlan0keyring/nodev#*md5sumcgroup\x00') pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 20:58:25 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) [ 1221.168453] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000180)={0x0, 0x0, 0x1, 0x0, 0x0, [{}]}) 20:58:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 20:58:25 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x146, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 20:58:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1221.475212] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1221.512283] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1221.605391] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1221.641513] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007d00)=[{{0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=[{0x10, 0x117}], 0x10, 0x8000}, 0x9}], 0x1, 0x0) 20:58:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:26 executing program 2: clone(0x2180000, &(0x7f0000000400), &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) 20:58:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x131, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1221.844021] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:26 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) futex(&(0x7f00000001c0), 0xb, 0x0, &(0x7f00000002c0), &(0x7f0000000280), 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) fcntl$dupfd(r0, 0x406, r0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x400, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000380)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file0/file0\x00', 0xe, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003880)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000003840)='IPVS\x00'}, 0x30) [ 1221.937453] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000feffff0700"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1222.125484] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1222.199464] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:26 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xd3, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$setpipe(r0, 0x407, 0x1c00000000) 20:58:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:26 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x400000002e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) 20:58:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1a2, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000ffffffff00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:26 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0xfe9e) fcntl$setstatus(r1, 0x4, 0x100000000046c00) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xffffffff) 20:58:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@l2, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 1222.489378] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1222.506199] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1222.602464] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1222.637987] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:27 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) sendmmsg(r0, &(0x7f0000003b40)=[{{&(0x7f0000000080)=@nl, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)}}], 0x1, 0x0) 20:58:27 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:27 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000300), 0x0) 20:58:27 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1a5, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:27 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x15c, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:27 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f0000000240)='posix_acl_accesswlan0keyring/nodev#*md5sumcgroup\x00') [ 1223.433516] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:27 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1223.500549] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:27 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000180)=0x9, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 20:58:27 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x117, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1223.614071] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1223.682159] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:27 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1223.724609] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1223.788304] IPVS: ftp: loaded support on port[0] = 21 20:58:28 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x58) [ 1225.568062] bridge0: port 1(bridge_slave_0) entered blocking state [ 1225.574624] bridge0: port 1(bridge_slave_0) entered disabled state [ 1225.582244] device bridge_slave_0 entered promiscuous mode [ 1225.716881] bridge0: port 2(bridge_slave_1) entered blocking state [ 1225.723641] bridge0: port 2(bridge_slave_1) entered disabled state [ 1225.730921] device bridge_slave_1 entered promiscuous mode [ 1225.749352] device bridge_slave_1 left promiscuous mode [ 1225.754936] bridge0: port 2(bridge_slave_1) entered disabled state [ 1225.819758] device bridge_slave_0 left promiscuous mode [ 1225.825253] bridge0: port 1(bridge_slave_0) entered disabled state [ 1227.875478] team0 (unregistering): Port device team_slave_1 removed [ 1227.885553] team0 (unregistering): Port device team_slave_0 removed [ 1227.896572] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1227.943298] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1228.010114] bond0 (unregistering): Released all slaves [ 1228.104376] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1228.135047] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1228.220829] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1228.252698] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1228.478499] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1228.486444] team0: Port device team_slave_0 added [ 1228.531763] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1228.539558] team0: Port device team_slave_1 added [ 1228.585551] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1228.636746] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1228.685219] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1228.692705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1228.710728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1228.749292] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1228.756467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1228.776412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1229.260963] bridge0: port 2(bridge_slave_1) entered blocking state [ 1229.267376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1229.274177] bridge0: port 1(bridge_slave_0) entered blocking state [ 1229.280598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1229.288960] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1230.200275] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1230.382011] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1230.472953] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1230.565058] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1230.571428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1230.578601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1230.670998] 8021q: adding VLAN 0 to HW filter on device team0 20:58:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:35 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:35 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x187, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:35 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1c1, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) 20:58:35 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[], 0xffffffffffffff9c}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 20:58:35 executing program 5: syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="1180c20000529300000000008100000008060006080006040001f8bf88df5b1bac1414bbaaaaaaaaaa00ac1414bb"], &(0x7f0000000040)) [ 1231.269057] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:35 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:35 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a000200000e335754625a3470000000000100000000000000000000000000000001000000044083724c532a7b687a296e4e567950b74831da74af4fcfb71ce598bf839fb05f46562540e4481f13"], 0x60}}, 0x0) 20:58:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000008c0)="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") ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x6, 0x2}) [ 1231.477262] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:35 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000008c0)="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") ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="07000000000000000400000000000000030000002920f64caf"]) 20:58:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x1) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x7a04, &(0x7f0000000240)=ANY=[]) umount2(&(0x7f0000000700)='./file0\x00', 0x2) 20:58:36 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xf7, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:36 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x42, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:36 executing program 5: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000240)={{{@in=@broadcast, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x200) 20:58:36 executing program 5: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6tnl0\x00', 0x10) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000001c0)={0x14}, 0x14) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) 20:58:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:36 executing program 2: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r2, &(0x7f0000002e00)=[{{&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000740)=""/255, 0xff}}], 0x1, 0x0, &(0x7f0000002f00)) ioctl$sock_netdev_private(r1, 0x0, &(0x7f0000000500)) 20:58:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000008c0)="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") ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x6, 0x2, 0x0, 0x1, [{}]}) 20:58:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:36 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x201, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:36 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x199, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:36 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) 20:58:37 executing program 5: r0 = memfd_create(&(0x7f00000000c0)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) write(r0, &(0x7f0000000180)="a8", 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000317000), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='^\x00') 20:58:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) [ 1232.983701] IPVS: ftp: loaded support on port[0] = 21 20:58:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={@local, 0x0, r1}) 20:58:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:37 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1f7, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:37 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) [ 1233.309958] device bridge_slave_1 left promiscuous mode [ 1233.315534] bridge0: port 2(bridge_slave_1) entered disabled state [ 1233.380692] device bridge_slave_0 left promiscuous mode [ 1233.387732] bridge0: port 1(bridge_slave_0) entered disabled state [ 1233.656072] team0 (unregistering): Port device team_slave_1 removed [ 1233.692128] team0 (unregistering): Port device team_slave_0 removed [ 1233.740404] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1233.805676] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1233.870939] bond0 (unregistering): Released all slaves [ 1234.456998] bridge0: port 1(bridge_slave_0) entered blocking state [ 1234.463665] bridge0: port 1(bridge_slave_0) entered disabled state [ 1234.471348] device bridge_slave_0 entered promiscuous mode [ 1234.517783] bridge0: port 2(bridge_slave_1) entered blocking state [ 1234.524822] bridge0: port 2(bridge_slave_1) entered disabled state [ 1234.534175] device bridge_slave_1 entered promiscuous mode [ 1234.581318] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1234.627876] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1234.768594] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1234.818375] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1235.037545] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1235.045245] team0: Port device team_slave_0 added [ 1235.092258] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1235.099860] team0: Port device team_slave_1 added [ 1235.144831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1235.194850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1235.236616] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1235.244256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1235.253492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1235.280033] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1235.287117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1235.296249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1235.646931] bridge0: port 2(bridge_slave_1) entered blocking state [ 1235.653345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1235.660074] bridge0: port 1(bridge_slave_0) entered blocking state [ 1235.666467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1235.673915] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1235.952123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1236.666873] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1236.758590] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1236.850870] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1236.857017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1236.864262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1236.955391] 8021q: adding VLAN 0 to HW filter on device team0 20:58:41 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:41 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:41 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x2) 20:58:41 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1cf, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:41 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x7d, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) [ 1237.508292] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1237.517582] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:41 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) [ 1237.549444] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1237.587933] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:41 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:41 executing program 5: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) renameat2(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000001440)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) 20:58:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:41 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:41 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:42 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x845, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x40305828, 0x0) 20:58:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:42 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) 20:58:42 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xa, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1237.943474] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1238.025361] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:42 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xcf, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000100)={[], 0x0, 0x9, 0x6}) 20:58:42 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) 20:58:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:42 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:42 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) 20:58:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:42 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1238.248132] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1238.268441] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:42 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x6c}}) 20:58:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:42 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1238.620793] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1238.640328] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:43 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000040)={0x37, 0x6, 0x0, {0x0, 0x0, 0xe, 0x0, 'em0}-\'.keyring'}}, 0xff30) 20:58:43 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:43 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:43 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x61, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:43 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x18b, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:43 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x18, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x0) [ 1238.875997] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:43 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000feffff0700"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) [ 1238.933548] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:43 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) [ 1239.030813] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:43 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) [ 1239.075472] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:43 executing program 5: syz_mount_image$f2fs(&(0x7f0000000200)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)) [ 1239.263063] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) [ 1239.333137] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1239.349761] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:43 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1239.418125] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1239.499318] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1239.546666] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1239.556768] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1239.565623] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 20:58:43 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x82, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488d") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) [ 1239.609057] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1239.616197] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1239.668921] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1239.676055] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1239.833668] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1239.872674] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 20:58:44 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1af, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:44 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488d") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) [ 1239.919298] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1239.954846] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488d") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) [ 1239.990658] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 1240.004207] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1240.062253] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1240.155836] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 1240.174802] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1240.184443] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 20:58:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:44 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:44 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:44 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x38, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:44 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 20:58:44 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x15b, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1240.627250] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1240.666316] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1240.787938] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1240.818428] IPVS: ftp: loaded support on port[0] = 21 20:58:44 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:45 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x840000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x9, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 20:58:45 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:45 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1ac, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:45 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xe2, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:46 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, &(0x7f0000000080)="dfe278d84f047e1808a3a992ddc389ae510e72c21d071d767c92f5a76aabd0152fcbd05c4db7f4e5e729497dfc375f1a021a5b1fd8ea7d7047775b8daf66303ddae94f4cc9d10f0e4bd21802c30927bf91de19baad5d68d29e6c0265b15278bc3a26defe99b129cae1e0377939e119e495cb84900b82d2c0689fd8d30bcd08437ed371f99c2b1cb8434a8ed7a106d463883ccdd36f76022dd29c59311fd01f26dc7cb7bb2578798d919b871cbb90dda4fccbca8d521c0c9c95c6278cad91c144f5079d7aa44b35c54465cb314586eae1b2afb0d94912bea757906d494c2e049598bae15d4a1b6892ed414e4ca5448a7e457350859333529825a60e93889fece46d4917cb7b429852148679694cbbb5d71bd8c81da130daf7387dc095c6ea85a19f5c62434a0b42723ae95420971a2edaa24f04e1c558283be5b08d1903dd2aa5b55ff876b7df8ad497a163fc1667bf677560acc9bdc58fd2190ceb7ee16969f2b7924651b5256b83fa8cee4a85b601371092d883db7c63cc060f80cc96a47d90dfc06ebf61665b68ab6c40e701325f2ad65b98bbc038fc1f70c5cec0ef6de84b30f331304e18333bf6018ab00b454771618a74cdcb90bae013843a586b8da3f26fc134faea8f02f500ccfc8d8e056bfe8154a816b1c836d2f0345fe72801be88a7bf12b5b70f3fca631f4f27ade17670201ca78090a2ce78f7660b62d6b1ae74b433a537ec8972cd75ed3aef141e6e274274ceed44bdcd0b8da06e8862dfb649d39a860042261fc9ab949991711eac9264633a7f15ff272779b3015c402e43e63fa3cbb3baaffe971b739673c5313ef74a7c2a480a7302734a607e1cd559189f4aee38fbcd3bde9776c29fc8426b18bb0029546358d39ce716f03359f656cb3103e1ef253bd0614af54f8d7d03f6bf80ab3ae047aadfd7a3e006f9f04e326f391426a8618dcf4747f189c892ca162d7a2949aedf8eb6ead2a7f8673c03830282983f880d7ff55b9bc04afd7439857238bef451407dbd506b94d8a0085a9649e9d2f24d4442ce81791d7f0b00eefc6547c57493812cb93d1166bd506ff8cd0852edd7d8ccf90a2f5f137e82c7f2b356ab3f7fc0f854f82608949d79e780d563642ee0ee73397a83117059d2b30f4dc169f98474d01200cd765918dde6c075b3444d46c0859a7d921469c7ffa6a1caac885a8f285fe70c48233d29061f13b216ac406247a68aa3c516fac4cacbd78a303377130cd92ba8331614365765b2c80cb717626c9f6e9b45d6d16b10ca7325316e8107c2b57d630b46fb8369905a2e9b75e0a3b0972634b46e44430310580e9ae49ac0f065261ca26053dc08aafb3308e40d709a6404fa39e45e9643edf205ba121470c36389e3c161ab41179418b71652f92cb4b3a6d925fcd7d5c0a13ab9c020446aae0e7d3eedf23fec3ffa6ed748953bf7a5e19960f43313f16e5bb43f3e6adc62a5a45db3ea43e44ed6ee5596a6c66c747aab8757ee26d5912a07edecd4e4b9d6f6a03c6f4d7445d041fab5cdd668280b392be052ca3095a8408ac836e6d361f5c7512768f6897b7529d658503f61bcffc714e95adabd1178191b3d82d959200e508c6358af53b7684d2cab8ed404cdfd134e004a71deaaaec8c9835e5a711b51e1829f96c2be8ad2c851f8b70c70114cbb7d647cfb26ba91f62ec29925e6f10aebbb0a28a7ffcfc360d86a70ade4d3d2bbbea005b41823f2a54b1513ee080e62d3f337a0e250d592ef3a43be37bef30496fe34eb2eb7b038bf1a8ad837c18cd9745e937d7c0503d1c50ed4a9f3d446eccc3cddc586df7c077e09119b5172dee9d6349783329c2c7a2d71dfb7c2d7aa656f2599b84fab8ee1c21073c7cf64babeb4f768d8c283ff7599849e36d5a7d7071b396fbde96af351d02ff61b159bddbb8d66e51d6431eee6173857d089d4ab3ac1c05b57c80a08fe3d1c89aefb7fe07df71b0d0f636e5b8a609af0a1e708390f828907e7691fad891c5d7a6cf7cd8842ce264ecdc1caf78795883e37a3a8b7dbd67cff31ab2c868a79691c", 0x5ad, 0x0, &(0x7f0000089000)={0xa, 0x3, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000740), 0x4) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000640)={0xa, 0x4e20, 0x0, @remote}, 0x1c) sendto(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000680)=@in={0x2, 0x4e20}, 0x80) [ 1243.519205] device bridge_slave_1 left promiscuous mode [ 1243.524784] bridge0: port 2(bridge_slave_1) entered disabled state [ 1243.569653] device bridge_slave_0 left promiscuous mode [ 1243.575120] bridge0: port 1(bridge_slave_0) entered disabled state [ 1245.598256] team0 (unregistering): Port device team_slave_1 removed [ 1245.608417] team0 (unregistering): Port device team_slave_0 removed [ 1245.619425] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1245.662961] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1245.720236] bond0 (unregistering): Released all slaves [ 1245.810143] bridge0: port 1(bridge_slave_0) entered blocking state [ 1245.816596] bridge0: port 1(bridge_slave_0) entered disabled state [ 1245.824359] device bridge_slave_0 entered promiscuous mode [ 1245.858216] bridge0: port 2(bridge_slave_1) entered blocking state [ 1245.864743] bridge0: port 2(bridge_slave_1) entered disabled state [ 1245.872652] device bridge_slave_1 entered promiscuous mode [ 1245.926874] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1245.972318] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1246.114914] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1246.165577] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1246.386458] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1246.394130] team0: Port device team_slave_0 added [ 1246.440942] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1246.448432] team0: Port device team_slave_1 added [ 1246.493433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1246.543892] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1246.591288] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1246.598492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1246.615794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1246.656439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1247.086590] bridge0: port 2(bridge_slave_1) entered blocking state [ 1247.093025] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1247.099763] bridge0: port 1(bridge_slave_0) entered blocking state [ 1247.106162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1247.114742] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1247.809003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1247.869826] device bridge_slave_1 left promiscuous mode [ 1247.875352] bridge0: port 2(bridge_slave_1) entered disabled state [ 1247.919586] device bridge_slave_0 left promiscuous mode [ 1247.925052] bridge0: port 1(bridge_slave_0) entered disabled state [ 1247.999824] team0 (unregistering): Port device team_slave_1 removed [ 1248.010509] team0 (unregistering): Port device team_slave_0 removed [ 1248.021798] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1248.072759] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1248.129882] bond0 (unregistering): Released all slaves [ 1248.653797] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1248.817981] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1248.984631] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1248.991311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1249.008793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1249.176354] 8021q: adding VLAN 0 to HW filter on device team0 20:58:54 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000200)="736d617073009223300ed429bc1629a3904cd7e9657f400b8dd19fcb5a8d61fa1cde666e59bea345efc705e61e5f77f53a36137a6d9b860000000000000000000000000000000000") r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0x6}) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000400)) 20:58:54 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xda, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:54 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x120, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:54 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:54 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:54 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:54 executing program 5: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae9720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aaa95f07af2c1e2f6d8908a5c49f3bab530e4f0c9cb2132921a990", 0x5c) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 20:58:54 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:54 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$UI_BEGIN_FF_ERASE(r0, 0x405c5504, &(0x7f0000000040)) 20:58:54 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:54 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$UI_BEGIN_FF_ERASE(r0, 0x405c5504, &(0x7f0000000040)) [ 1250.659084] IPVS: ftp: loaded support on port[0] = 21 20:58:55 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xea, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:55 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) [ 1251.377902] bridge0: port 1(bridge_slave_0) entered blocking state [ 1251.384484] bridge0: port 1(bridge_slave_0) entered disabled state [ 1251.391784] device bridge_slave_0 entered promiscuous mode [ 1251.421843] bridge0: port 2(bridge_slave_1) entered blocking state [ 1251.428331] bridge0: port 2(bridge_slave_1) entered disabled state [ 1251.435801] device bridge_slave_1 entered promiscuous mode [ 1251.464941] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1251.494059] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1251.576880] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1251.608128] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1251.736428] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1251.743784] team0: Port device team_slave_0 added [ 1251.770519] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1251.777712] team0: Port device team_slave_1 added [ 1251.805017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1251.835344] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1251.864325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1251.894820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1252.170576] bridge0: port 2(bridge_slave_1) entered blocking state [ 1252.176941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1252.183654] bridge0: port 1(bridge_slave_0) entered blocking state [ 1252.190037] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1253.159821] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1253.257839] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1253.356212] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1253.362495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1253.370322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1253.457193] 8021q: adding VLAN 0 to HW filter on device team0 20:58:58 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:58 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$UI_BEGIN_FF_ERASE(r0, 0x405c5504, &(0x7f0000000040)) 20:58:58 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x16f, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:58 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:58 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xcd, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:58 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:58 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4005eed) fallocate(r1, 0x20, 0x0, 0x100008000) 20:58:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:58:58 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) [ 1254.139560] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:58 executing program 5: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) clone(0x0, &(0x7f0000000180), &(0x7f0000001480), &(0x7f0000001400), &(0x7f0000000100)) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="8c3fa8dd08719413c7fae88a62cd8b63990770096a899e7d86385664989edf12a8"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, &(0x7f0000001480)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000280), 0x0, &(0x7f00000001c0)) [ 1254.221893] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:58 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:58 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x30, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}]}, 0x30}}, 0x0) [ 1254.473329] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1254.530404] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:58 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x19f, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x20, 0x10, 0xc11}, 0x20}}, 0x0) 20:58:58 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:59 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x33, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:59 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x20, 0x10, 0xc11}, 0x20}}, 0x0) 20:58:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet_tcp_int(r0, 0x6, 0x11, &(0x7f00000000c0)=0x8, 0x4) 20:58:59 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) [ 1254.816446] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:59 executing program 5: clone(0x40007ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) 20:58:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1254.866868] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x20, 0x10, 0xc11}, 0x20}}, 0x0) [ 1255.059238] IPVS: ftp: loaded support on port[0] = 21 [ 1255.066564] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1255.088522] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1255.312925] IPVS: ftp: loaded support on port[0] = 21 20:58:59 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x184, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:59 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x0, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:59 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) io_cancel(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040)}, &(0x7f0000000100)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet6_buf(r0, 0x29, 0x80000000000040, &(0x7f0000000080), 0x5c206f9640e7a35d) 20:58:59 executing program 5: 20:58:59 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x35, &(0x7f00000011c0)}}], 0x249, 0x0) 20:58:59 executing program 4: 20:58:59 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x0, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:59 executing program 5: [ 1255.453784] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1255.462319] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:58:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000ffffffff00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:58:59 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x0, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:58:59 executing program 5: [ 1255.641771] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1255.662024] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:00 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x141, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:00 executing program 4: 20:59:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:00 executing program 5: 20:59:00 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:59:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x195, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:00 executing program 5: 20:59:00 executing program 4: 20:59:00 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) [ 1256.065697] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1256.100654] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:00 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:59:00 executing program 5: [ 1256.272417] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1256.369983] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:00 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x13d, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:00 executing program 4: 20:59:00 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001]}, 0x5c) 20:59:00 executing program 5: 20:59:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1df, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:00 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:59:00 executing program 5: [ 1256.687956] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:00 executing program 4: [ 1256.759415] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:01 executing program 5: 20:59:01 executing program 2: [ 1256.899650] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1256.945109] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:01 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x210, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:01 executing program 4: 20:59:01 executing program 5: 20:59:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:01 executing program 2: 20:59:01 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x67, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:01 executing program 5: 20:59:01 executing program 4: 20:59:01 executing program 2: [ 1257.392535] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:01 executing program 2: 20:59:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:01 executing program 5: [ 1257.531463] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1257.671228] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1257.705267] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:02 executing program 2: 20:59:02 executing program 4: 20:59:02 executing program 5: 20:59:02 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:02 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1bd, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x23b, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:02 executing program 2: 20:59:02 executing program 4: 20:59:02 executing program 5: [ 1258.002725] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1258.071449] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:02 executing program 2: 20:59:02 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:02 executing program 4: 20:59:02 executing program 5: 20:59:02 executing program 2: [ 1258.253289] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:02 executing program 4: 20:59:02 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1258.462772] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:02 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x234, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:02 executing program 5: 20:59:02 executing program 2: 20:59:02 executing program 4: 20:59:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x22c, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:02 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:02 executing program 2: 20:59:02 executing program 4: [ 1258.747464] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:03 executing program 5: 20:59:03 executing program 2: 20:59:03 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:03 executing program 4: [ 1258.988908] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:03 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x25, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:03 executing program 5: 20:59:03 executing program 2: 20:59:03 executing program 4: 20:59:03 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:03 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xb6, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:03 executing program 4: 20:59:03 executing program 5: 20:59:03 executing program 2: [ 1259.382932] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:03 executing program 4: 20:59:03 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:03 executing program 2: [ 1259.611005] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:04 executing program 4: 20:59:04 executing program 5: 20:59:04 executing program 2: 20:59:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:04 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x108, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x164, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:04 executing program 4: 20:59:04 executing program 5: [ 1260.019373] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:04 executing program 2: 20:59:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:04 executing program 4: 20:59:04 executing program 5: 20:59:04 executing program 2: 20:59:04 executing program 4: [ 1260.305445] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:04 executing program 5: 20:59:04 executing program 2: 20:59:04 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1fb, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:04 executing program 2: 20:59:04 executing program 4: 20:59:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:04 executing program 5: 20:59:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x18f, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:05 executing program 5: [ 1260.768264] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:05 executing program 4: 20:59:05 executing program 2: 20:59:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:05 executing program 2: 20:59:05 executing program 4: [ 1261.051136] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:05 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xd7, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:05 executing program 5: 20:59:05 executing program 2: 20:59:05 executing program 4: 20:59:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x215, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:05 executing program 2: 20:59:05 executing program 4: 20:59:05 executing program 5: [ 1261.443254] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:05 executing program 2: 20:59:05 executing program 5: [ 1261.630488] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:06 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000ffffffff00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:06 executing program 4: 20:59:06 executing program 5: 20:59:06 executing program 2: 20:59:06 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1b7, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:06 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x165, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:06 executing program 2: 20:59:06 executing program 5: [ 1262.112366] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:06 executing program 4: 20:59:06 executing program 2: 20:59:06 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:06 executing program 5: 20:59:06 executing program 4: 20:59:06 executing program 2: 20:59:06 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:06 executing program 5: [ 1262.559884] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x2e, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:07 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1cc, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:07 executing program 4: 20:59:07 executing program 2: 20:59:07 executing program 5: 20:59:07 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:07 executing program 4: 20:59:07 executing program 5: [ 1262.915330] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:07 executing program 2: 20:59:07 executing program 5: 20:59:07 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:07 executing program 4: [ 1263.181575] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xd8, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:08 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x2, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:08 executing program 2: 20:59:08 executing program 5: 20:59:08 executing program 4: 20:59:08 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:08 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x8b, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:08 executing program 2: 20:59:08 executing program 4: 20:59:08 executing program 5: 20:59:08 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1263.919954] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:08 executing program 5: 20:59:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) [ 1264.090761] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:08 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1d5, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:08 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getpeername(r0, &(0x7f0000000700)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000780)=0x80) getegid() geteuid() stat(&(0x7f0000003280)='./file0\x00', &(0x7f00000032c0)) getgroups(0x1, &(0x7f0000004840)=[0xee00]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004940), &(0x7f0000004980)=0xc) lstat(&(0x7f00000049c0)='./file0\x00', &(0x7f0000004a00)) fstat(0xffffffffffffffff, &(0x7f0000004a80)) 20:59:08 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='selinuxfs\x00', 0x3, &(0x7f00000000c0)) rt_sigqueueinfo(0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x7ff}) 20:59:08 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:08 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="73746174007def5e4145ab48b3569a1db5263827f7619efea6a038daa72ba6703fea09e0274a020d393abad8afbd715373ea4bd3edbda98671f854d7a3b11284c9a409395317fadbd8365da3101f5c1b6c887473c7c400a0729aecadf87905cad864a5b85bfb3f0cbb4269046493dbbfd5006f5eb1c0f13a8c297064d0a5bb9c3c48d78fe68912508d96c8a6b2e5b667ab266e14731128bbd89fbda9b2d5c410d413fb823a9a86db1163e7ab77a5b121e506edf8bc0332c6b248944720d749266898f01ab1990031dc635340f5f51be37c23ae41dddde446fc38053102") exit(0x0) sendfile(r0, r1, &(0x7f0000000000), 0x2000007fe) 20:59:08 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1ab, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:08 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 1264.561855] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:08 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:08 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:08 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xb6, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:08 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x141, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:09 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 1264.817179] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:09 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x14d, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:09 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:09 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:09 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:59:09 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x151, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:09 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:09 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) [ 1265.384502] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:09 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:09 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:09 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:59:09 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:59:09 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 1265.683031] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:10 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e20, 0xffffffffffffff80, @remote}, {0xa, 0x0, 0x0, @dev}, 0x1, [0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) 20:59:10 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:10 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1ad, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:10 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xcf, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:10 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x109, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:10 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) 20:59:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 1266.141840] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:10 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) 20:59:10 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000feffff0700"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xc11, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}]}, 0x44}}, 0x0) 20:59:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 1266.433188] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:11 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x5e, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:11 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:11 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xf3, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:11 executing program 4: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:11 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x19f, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 1266.846560] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:11 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 1267.271570] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:11 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:11 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x41, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 20:59:11 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x55, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:12 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:12 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:12 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x5e, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:12 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:12 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:12 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:12 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x17a, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:12 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x84, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:12 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) 20:59:12 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 1268.766656] IPVS: ftp: loaded support on port[0] = 21 20:59:13 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1d, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:13 executing program 4: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1ca, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1268.954683] device bridge_slave_1 left promiscuous mode [ 1268.962240] bridge0: port 2(bridge_slave_1) entered disabled state [ 1269.025000] device bridge_slave_0 left promiscuous mode [ 1269.031429] bridge0: port 1(bridge_slave_0) entered disabled state [ 1269.234036] team0 (unregistering): Port device team_slave_1 removed [ 1269.296765] team0 (unregistering): Port device team_slave_0 removed [ 1269.344817] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1269.416288] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1269.504953] bond0 (unregistering): Released all slaves [ 1270.237039] bridge0: port 1(bridge_slave_0) entered blocking state [ 1270.243781] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.251749] device bridge_slave_0 entered promiscuous mode [ 1270.299815] bridge0: port 2(bridge_slave_1) entered blocking state [ 1270.306306] bridge0: port 2(bridge_slave_1) entered disabled state [ 1270.315034] device bridge_slave_1 entered promiscuous mode [ 1270.360089] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1270.405563] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1270.546051] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1270.596663] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1270.644596] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1270.651629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1270.700922] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1270.707917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1270.843841] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1270.851311] team0: Port device team_slave_0 added [ 1270.882215] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1270.889653] team0: Port device team_slave_1 added [ 1270.923913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1270.974638] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1271.013248] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1271.020769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1271.028704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1271.058692] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1271.066175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1271.075626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1271.396826] bridge0: port 2(bridge_slave_1) entered blocking state [ 1271.403291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1271.410027] bridge0: port 1(bridge_slave_0) entered blocking state [ 1271.416400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1271.423920] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1271.608988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1272.430532] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1272.526882] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1272.627024] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1272.633304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1272.641547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1272.734359] 8021q: adding VLAN 0 to HW filter on device team0 20:59:17 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:17 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:17 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1da, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:17 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xb4, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:17 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x14b, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x1000000, 0x0, 0x6921, 0x18}}, 0xffffffffffffffff, 0x1000000, 0xfd83, 0x1}, 0x20) [ 1273.293696] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1273.302260] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x1000000, 0x0, 0x6921, 0x18}}, 0xffffffffffffffff, 0x1000000, 0xfd83, 0x1}, 0x20) [ 1273.442626] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:17 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:17 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1273.540366] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:17 executing program 4: r0 = memfd_create(&(0x7f0000000280)="2d42d54e49c56aba707070f00884a26d000b180034a24579dbd1a7b1533a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4e6e600000", 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) sendfile(r0, r0, &(0x7f0000000140), 0xa5ff) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) [ 1273.735047] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:18 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1273.820981] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1273.981917] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:18 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x22f, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1274.023426] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:18 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1274.162300] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:18 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1274.272521] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:18 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x28, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:18 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x19b, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:18 executing program 4: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x125, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1274.373706] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1274.478935] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:18 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1274.684027] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1274.774116] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:19 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1275.033135] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1275.053910] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:19 executing program 4: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x125, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:19 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) getpeername(0xffffffffffffff9c, &(0x7f0000006780)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000006800)=0x80) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000000000)={0x10000000}) 20:59:19 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x221, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:19 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x7, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:19 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1275.405234] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:19 executing program 5: clone(0x4002102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000140)) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x17) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000540)={@empty, @mcast2, @ipv4={[], [], @loopback}, 0x0, 0x0, 0x7, 0x400}) 20:59:19 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1275.450585] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:19 executing program 5: r0 = memfd_create(&(0x7f00000002c0)="4844a563c608a8f88200", 0x0) write(r0, &(0x7f0000000080)="a8", 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) clone(0x4002102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) futex(&(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, &(0x7f0000000240), 0x0) [ 1275.671007] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:19 executing program 5: pipe(&(0x7f00003fe000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r0, r3, 0x80007385, 0x0) r4 = dup2(r2, r3) ioctl$int_in(r4, 0x5452, &(0x7f0000e35ff8)=0x45) write(r1, &(0x7f0000000000)='#', 0x1) [ 1275.764857] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:20 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1275.946383] IPVS: ftp: loaded support on port[0] = 21 [ 1275.946941] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)="237d009a1bc25f52ead3dd54d0ec3ba49d563ea411a4ac9e1eacaa54d5d3f83cd759620449dc742c26e930a8afffd3cdcd2d9027a276ba6ca36c22a047eb441d8c8e158d6060b2db9e27ef5fde3f69ac6c03aadc2896be649b1d9513bee7b8a3133edd7d87c759f192e342496b79e885e95e1db2d259636e9daf51b102997a81ffc2dd29fe27b8225840d62cb5a6a2e13aec471dfe8685e7d4f62143a3cff353ea41d711c94f8e2b948c1fd68897d0dd2a902922da", 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0) [ 1276.057907] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1276.229780] device bridge_slave_1 left promiscuous mode [ 1276.235340] bridge0: port 2(bridge_slave_1) entered disabled state [ 1276.299987] device bridge_slave_0 left promiscuous mode [ 1276.305545] bridge0: port 1(bridge_slave_0) entered disabled state [ 1276.384411] team0 (unregistering): Port device team_slave_1 removed [ 1276.394470] team0 (unregistering): Port device team_slave_0 removed [ 1276.405675] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1276.473638] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1276.547599] bond0 (unregistering): Released all slaves [ 1277.100126] bridge0: port 1(bridge_slave_0) entered blocking state [ 1277.106912] bridge0: port 1(bridge_slave_0) entered disabled state [ 1277.114801] device bridge_slave_0 entered promiscuous mode [ 1277.163840] bridge0: port 2(bridge_slave_1) entered blocking state [ 1277.170730] bridge0: port 2(bridge_slave_1) entered disabled state [ 1277.178198] device bridge_slave_1 entered promiscuous mode [ 1277.223694] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1277.269719] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1277.411829] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1277.460334] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1277.682421] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1277.690044] team0: Port device team_slave_0 added [ 1277.736621] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1277.744703] team0: Port device team_slave_1 added [ 1277.788659] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1277.795921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1277.812677] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1277.842951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1277.891982] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1277.899181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1277.907113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1277.936277] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1277.943766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1277.952830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1278.301408] bridge0: port 2(bridge_slave_1) entered blocking state [ 1278.307767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1278.314498] bridge0: port 1(bridge_slave_0) entered blocking state [ 1278.320907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1278.328225] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1278.678913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1279.296058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1279.385251] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1279.478025] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1279.484779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1279.492222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1279.587394] 8021q: adding VLAN 0 to HW filter on device team0 20:59:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:24 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = dup2(0xffffffffffffffff, r0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000180)) fsetxattr(r0, &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000000040)=',-,!^selinuxeth0,\x00', 0x12, 0x3) getpeername(r0, &(0x7f0000000700)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000780)=0x80) r4 = fcntl$dupfd(r3, 0x406, 0xffffffffffffffff) ioctl$TIOCSBRK(r4, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004940), &(0x7f0000004980)=0xc) lstat(&(0x7f00000049c0)='./file0\x00', &(0x7f0000004a00)) fstat(0xffffffffffffffff, &(0x7f0000004a80)) 20:59:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000001580)=0x1b) 20:59:24 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xc2, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:24 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x3, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:24 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = dup2(0xffffffffffffffff, r0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000180)) fsetxattr(r0, &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000000040)=',-,!^selinuxeth0,\x00', 0x12, 0x3) getpeername(r0, &(0x7f0000000700)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000780)=0x80) r4 = fcntl$dupfd(r3, 0x406, 0xffffffffffffffff) ioctl$TIOCSBRK(r4, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004940), &(0x7f0000004980)=0xc) lstat(&(0x7f00000049c0)='./file0\x00', &(0x7f0000004a00)) fstat(0xffffffffffffffff, &(0x7f0000004a80)) [ 1280.187889] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1280.199900] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:24 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:24 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="237d009a1bc25f52ead3dd54d0ec3ba49d563ea411a4ac9e1eacaa54d5d3f83cd759620449dc742c26e930a8afffd3cdcd2d9027a276ba6ca36c22a047eb441d8c8e158d6060b2db9e27ef5fde3f69ac6c03aadc2896be649b1d9513bee7b8a3133edd7d87c759f192e342496b79e885e95e1db2d259636e9daf51b102997a81ffc2dd29fe27b8225840d62cb5a6a2e13aec471dfe8685e7d4f62143a3cff353ea41d711c94f8e2b948c1fd68897d0dd2a902922da", 0x0) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f0000000240), 0x100000000002) 20:59:24 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = dup2(0xffffffffffffffff, r0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000180)) fsetxattr(r0, &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000000040)=',-,!^selinuxeth0,\x00', 0x12, 0x3) getpeername(r0, &(0x7f0000000700)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000780)=0x80) r4 = fcntl$dupfd(r3, 0x406, 0xffffffffffffffff) ioctl$TIOCSBRK(r4, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004940), &(0x7f0000004980)=0xc) lstat(&(0x7f00000049c0)='./file0\x00', &(0x7f0000004a00)) fstat(0xffffffffffffffff, &(0x7f0000004a80)) [ 1280.412959] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1280.465952] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:24 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000080)=[0x6]) 20:59:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 1280.638990] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1280.682806] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:25 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x3e, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:25 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xa1, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:25 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)="237d009a1bc25f52ead3dd54d0ec3ba49d563ea411a4ac9e1eacaa54d5d3f83cd759620449dc742c26e930a8afffd3cdcd2d9027a276ba6ca36c22a047eb441d8c8e158d6060b2db9e27ef5fde3f69ac6c03aadc2896be649b1d9513bee7b8a3133edd7d87c759f192e342496b79e885e95e1db2d259636e9daf51b102997a81ffc2dd29fe27b8225840d62cb5a6a2e13aec471dfe8685e7d4f62143a3cff353ea41d711c94f8e2b948c1fd68897d0dd2a902922da", 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) fcntl$addseals(r0, 0x409, 0x8) 20:59:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:25 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) futex(&(0x7f00000001c0), 0xb, 0x0, &(0x7f00000002c0), &(0x7f0000000280), 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) [ 1281.058059] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1281.169513] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:25 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setrlimit(0x8000000007, &(0x7f0000000000)) ptrace$peekuser(0x3, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) epoll_create1(0x0) pipe(&(0x7f0000000180)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000000c0)={0x2e, @remote, 0x4e23, 0x0, 'sed\x00'}, 0x2c) geteuid() mknod(&(0x7f0000000100)='./file0\x00', 0x124, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 20:59:25 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1af, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:25 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="237d009a1bc25f52ead3dd54d0ec3ba49d563ea411a4ac9e1eacaa54d5d3f83cd759620449dc742c26e930a8afffd3cdcd2d9027a276ba6ca36c22a047eb441d8c8e158d6060b2db9e27ef5fde3f69ac6c03aadc2896be649b1d9513bee7b8a3133edd7d87c759f192e342496b79e885e95e1db2d259636e9daf51b102997a81ffc2dd29fe27b8225840d62cb5a6a2e13aec471dfe8685e7d4f62143a3cff353ea41d711c94f8e2b948c1fd68897d0dd2a902922da", 0x2) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f0000000240), 0x100000000002) fcntl$addseals(r1, 0x409, 0x8) 20:59:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:25 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = dup2(0xffffffffffffffff, r0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000180)) fsetxattr(r0, &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000000040)=',-,!^selinuxeth0,\x00', 0x12, 0x3) getpeername(r0, &(0x7f0000000700)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000780)=0x80) r4 = fcntl$dupfd(r3, 0x406, 0xffffffffffffffff) ioctl$TIOCSBRK(r4, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004940), &(0x7f0000004980)=0xc) lstat(&(0x7f00000049c0)='./file0\x00', &(0x7f0000004a00)) fstat(0xffffffffffffffff, &(0x7f0000004a80)) 20:59:25 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xfa, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="237d009a1bc25f52ead3dd54d0ec3ba49d563ea411a4ac9e1eacaa54d5d3f83cd759620449dc742c26e930a8afffd3cdcd2d9027a276ba6ca36c22a047eb441d8c8e158d6060b2db9e27ef5fde3f69ac6c03aadc2896be649b1d9513bee7b8a3133edd7d87c759f192e342496b79e885e95e1db2d259636e9daf51b102997a81ffc2dd29fe27b8225840d62cb5a6a2e13aec471dfe8685e7d4f62143a3cff353ea41d711c94f8e2b948c1fd68897d0dd2a902922da", 0x2) memfd_create(&(0x7f0000000400)='{lo\x00', 0x0) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f0000000240), 0x100000000002) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) [ 1281.803892] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1281.976601] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:26 executing program 2: setrlimit(0x1000000000000007, &(0x7f000068d000)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() open(&(0x7f0000000000)='./file0\x00', 0x80, 0xc2) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)=0xc31, 0x4) sched_setscheduler(r0, 0x5, &(0x7f0000000c80)) inotify_init1(0x0) [ 1282.189017] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1282.230274] IPVS: ftp: loaded support on port[0] = 21 20:59:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:26 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) syz_read_part_table(0xfffffffffffffffe, 0x0, &(0x7f0000000200)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000140)) fcntl$setstatus(r0, 0x4, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r2 = getpgid(r1) capget(&(0x7f0000000200)={0x399f1336, r2}, &(0x7f00000002c0)={0x0, 0x0, 0x6}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000380), 0x0, 0x80000000}], 0x1004, &(0x7f00000005c0)={[{@noquota='noquota'}]}) [ 1282.340540] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1284.378028] bridge0: port 1(bridge_slave_0) entered blocking state [ 1284.384517] bridge0: port 1(bridge_slave_0) entered disabled state [ 1284.391780] device bridge_slave_0 entered promiscuous mode [ 1284.399277] device bridge_slave_1 left promiscuous mode [ 1284.404782] bridge0: port 2(bridge_slave_1) entered disabled state [ 1284.459590] device bridge_slave_0 left promiscuous mode [ 1284.465069] bridge0: port 1(bridge_slave_0) entered disabled state [ 1286.460855] team0 (unregistering): Port device team_slave_1 removed [ 1286.471527] team0 (unregistering): Port device team_slave_0 removed [ 1286.482124] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1286.543012] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1286.620446] bond0 (unregistering): Released all slaves [ 1286.674915] bridge0: port 2(bridge_slave_1) entered blocking state [ 1286.681497] bridge0: port 2(bridge_slave_1) entered disabled state [ 1286.688428] device bridge_slave_1 entered promiscuous mode [ 1286.717668] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1286.747054] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1286.825647] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1286.875500] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1287.087579] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1287.095449] team0: Port device team_slave_0 added [ 1287.138809] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1287.146290] team0: Port device team_slave_1 added [ 1287.192144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1287.240765] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1287.287078] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1287.294306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1287.311755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1287.351221] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1287.358397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1287.375835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1287.844872] bridge0: port 2(bridge_slave_1) entered blocking state [ 1287.851303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1287.858009] bridge0: port 1(bridge_slave_0) entered blocking state [ 1287.864497] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1287.872254] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1288.852366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1290.018265] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1290.209789] device bridge_slave_1 left promiscuous mode [ 1290.215328] bridge0: port 2(bridge_slave_1) entered disabled state [ 1290.260064] device bridge_slave_0 left promiscuous mode [ 1290.265524] bridge0: port 1(bridge_slave_0) entered disabled state [ 1292.263778] team0 (unregistering): Port device team_slave_1 removed [ 1292.273712] team0 (unregistering): Port device team_slave_0 removed [ 1292.284816] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1292.333452] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1292.388597] bond0 (unregistering): Released all slaves [ 1292.477122] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1292.585975] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1292.593048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1292.601067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1292.764625] 8021q: adding VLAN 0 to HW filter on device team0 20:59:37 executing program 4: r0 = memfd_create(&(0x7f00000002c0)="4844a563c608a8f88200", 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)="61bd50d5a3d673b17eb0b2889a2f6961c0d3b1509dd421f14e917813421625531fe8f6fb7c3de269fb656d2e5c340326cfc217bb167dba8f080ed5432472ce9d7c5862701d8383803decd1c68cc1ed50e9b4", 0x52}], 0x1, 0x20) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) futex(&(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, &(0x7f0000000240), 0x0) 20:59:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:37 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x2c, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:37 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x198, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:37 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000180)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000, 0x2, &(0x7f0000ffb000/0x3000)=nil) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 20:59:37 executing program 5: pwrite64(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="237d009a1bc25f52ead3dd54d0ec3ba49d563ea411a4ac9e1eacaa54d5d3f83cd759620449dc742c26e930a8afffd3cdcd2d9027a276ba6ca36c22a047eb441d8c8e158d6060b2db9e27ef5fde3f69ac6c03aadc2896be649b1d9513bee7b8a3133edd7d87c759f192e342496b79e885e95e1db2d259636e9daf51b102997a81ffc2dd29fe27b8225840d62cb5a6a2e13aec471dfe8685e7d4f62143a3cff353ea41d711c94f8e2b948c1fd68897d0dd2a902922da", 0x2) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f0000000240), 0x100000000002) fcntl$addseals(r1, 0x409, 0x8) 20:59:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8917, &(0x7f0000000000)={"6c6f3a05e6ff0100", {0x2, 0x0, @multicast1}}) [ 1293.777061] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:38 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8917, &(0x7f0000000000)={"6c6f3a05e6ff0100", {0x2, 0x0, @multicast1}}) 20:59:38 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000001580)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000001340)="bd2d7dcc58004b880ec1d01f66182f5235de3b288d4d24dfea31d3fa86f7ba05b99bbebb146e6b32f916f57b1d248d1c8e66935ec2a68bf75d33c18944365d541376c6505de06091277354d4c30cf2a08f891485640e0d80908798d003660b768bc80fa4ac77c51896a9b4f97fcd6643cda4c69c8ce16d784f656815c0a6aad1f8df3a") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) ftruncate(0xffffffffffffffff, 0x8200) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) fstat(r1, &(0x7f0000002c40)) 20:59:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8917, &(0x7f0000000000)={"6c6f3a05e6ff0100", {0x2, 0x0, @multicast1}}) [ 1294.099923] IPVS: ftp: loaded support on port[0] = 21 20:59:38 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)={@loopback}, 0x14) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000440)={@remote, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, &(0x7f0000000480)=0x20) 20:59:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8917, &(0x7f0000000000)={"6c6f3a05e6ff0100", {0x2, 0x0, @multicast1}}) 20:59:38 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x212, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:38 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)={@loopback}, 0x14) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000440)={@remote, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, &(0x7f0000000480)=0x20) 20:59:38 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x69, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:38 executing program 2: ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={"6c6f3a05e6ff0100", {0x2, 0x0, @multicast1}}) [ 1295.412668] bridge0: port 1(bridge_slave_0) entered blocking state [ 1295.419242] bridge0: port 1(bridge_slave_0) entered disabled state [ 1295.426241] device bridge_slave_0 entered promiscuous mode [ 1295.457888] bridge0: port 2(bridge_slave_1) entered blocking state [ 1295.464405] bridge0: port 2(bridge_slave_1) entered disabled state [ 1295.471643] device bridge_slave_1 entered promiscuous mode [ 1295.502699] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1295.534309] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1295.619541] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1295.654060] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1295.789407] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1295.796570] team0: Port device team_slave_0 added [ 1295.802591] device bridge_slave_1 left promiscuous mode [ 1295.808554] bridge0: port 2(bridge_slave_1) entered disabled state [ 1295.859772] device bridge_slave_0 left promiscuous mode [ 1295.865223] bridge0: port 1(bridge_slave_0) entered disabled state [ 1295.931076] team0 (unregistering): Port device team_slave_1 removed [ 1295.941321] team0 (unregistering): Port device team_slave_0 removed [ 1295.951852] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1296.002755] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1296.078485] bond0 (unregistering): Released all slaves [ 1296.134643] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1296.141899] team0: Port device team_slave_1 added [ 1296.167704] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1296.174602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1296.183240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1296.210646] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1296.217467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1296.226947] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1296.265535] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1296.272957] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1296.285919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1296.324391] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1296.331829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1296.343664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1296.815221] bridge0: port 2(bridge_slave_1) entered blocking state [ 1296.821656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1296.828340] bridge0: port 1(bridge_slave_0) entered blocking state [ 1296.834767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1296.842611] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1297.799134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1298.125278] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1298.220127] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1298.313062] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1298.319430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1298.326529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1298.422937] 8021q: adding VLAN 0 to HW filter on device team0 20:59:43 executing program 5: pwrite64(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="237d009a1bc25f52ead3dd54d0ec3ba49d563ea411a4ac9e1eacaa54d5d3f83cd759620449dc742c26e930a8afffd3cdcd2d9027a276ba6ca36c22a047eb441d8c8e158d6060b2db9e27ef5fde3f69ac6c03aadc2896be649b1d9513bee7b8a3133edd7d87c759f192e342496b79e885e95e1db2d259636e9daf51b102997a81ffc2dd29fe27b8225840d62cb5a6a2e13aec471dfe8685e7d4f62143a3cff353ea41d711c94f8e2b948c1fd68897d0dd2a902922da", 0x2) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f0000000240), 0x100000000002) fcntl$addseals(r1, 0x409, 0x8) 20:59:43 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)={@loopback}, 0x14) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000440)={@remote, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, &(0x7f0000000480)=0x20) 20:59:43 executing program 2: ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={"6c6f3a05e6ff0100", {0x2, 0x0, @multicast1}}) 20:59:43 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:43 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1be, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:43 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1c9, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:43 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)={@loopback}, 0x14) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000440)={@remote, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, &(0x7f0000000480)=0x20) 20:59:43 executing program 2: ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={"6c6f3a05e6ff0100", {0x2, 0x0, @multicast1}}) 20:59:43 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)={@loopback}, 0x14) 20:59:43 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={"6c6f3a05e6ff0100", {0x2, 0x0, @multicast1}}) 20:59:43 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:43 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={"6c6f3a05e6ff0100", {0x2, 0x0, @multicast1}}) 20:59:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') writev(r0, &(0x7f0000b97000)=[{&(0x7f0000000040)='1', 0x1}], 0x1) 20:59:43 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) [ 1299.734088] IPVS: ftp: loaded support on port[0] = 21 20:59:44 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={"6c6f3a05e6ff0100", {0x2, 0x0, @multicast1}}) [ 1300.471912] bridge0: port 1(bridge_slave_0) entered blocking state [ 1300.478343] bridge0: port 1(bridge_slave_0) entered disabled state [ 1300.485774] device bridge_slave_0 entered promiscuous mode [ 1300.514782] bridge0: port 2(bridge_slave_1) entered blocking state [ 1300.521496] bridge0: port 2(bridge_slave_1) entered disabled state [ 1300.528450] device bridge_slave_1 entered promiscuous mode [ 1300.556173] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1300.584954] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1300.666178] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1300.696633] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1300.821118] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1300.828279] team0: Port device team_slave_0 added [ 1300.855503] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1300.862816] team0: Port device team_slave_1 added [ 1300.889768] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1300.919937] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1300.950249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1300.980023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1301.249494] bridge0: port 2(bridge_slave_1) entered blocking state [ 1301.255893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1301.262598] bridge0: port 1(bridge_slave_0) entered blocking state [ 1301.268975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1302.229675] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1302.322047] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1302.415910] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1302.422208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1302.429430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1302.533619] 8021q: adding VLAN 0 to HW filter on device team0 20:59:47 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000feffff0700"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:47 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:47 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) prlimit64(0x0, 0x10, 0x0, &(0x7f0000000340)) fadvise64(0xffffffffffffffff, 0xb, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000100), 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0x14}, 0x14}}, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 20:59:47 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x217, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:47 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) recvfrom$inet(r0, &(0x7f0000000480)=""/4096, 0x1000, 0x40010040, &(0x7f0000001480)={0x2, 0x0, @rand_addr=0x4}, 0x10) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000014c0), 0x4) 20:59:47 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x18a, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:47 executing program 5: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r3, &(0x7f0000003080)=[{{&(0x7f00000003c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ee8caa8d101b053647486aecf6af59ef78a21863127dd953008e3d2b110deef7eb3709315ca9071768ea22b4ff33420f6e26f34d61408fce475eb01b4043f3"}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000500), 0xfffffffffffffee2}}], 0x1, 0x0) write$P9_RSTAT(r2, &(0x7f0000000280)={0x52, 0x7d, 0x0, {0x0, 0x4b, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, '-md5sum%-', 0x1, ':', 0xd, 'proc}-keyring', 0x1, '('}}, 0x52) 20:59:47 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:47 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:47 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:47 executing program 2: clone(0x200, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000740)="e91f7189591e9233614b00", &(0x7f00000005c0), &(0x7f0000000700)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200001e4) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}, 0x5c) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 20:59:47 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:47 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) [ 1303.401993] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1303.423308] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:47 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) [ 1303.491982] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1303.521364] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:47 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1303.663704] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1303.713667] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:48 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1ee, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:48 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:48 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1303.882364] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1303.908068] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:48 executing program 5: clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000600)=@file={0x1, "e91f7189591e9233614b00"}, 0x2b) r2 = accept(r1, &(0x7f0000000040)=@pppoe, &(0x7f00000000c0)=0x44a) sched_setscheduler(0x0, 0x0, &(0x7f0000000000)=0xffffffff8c9a210f) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000180)) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f00000001c0)=0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/148, &(0x7f0000000680)=0x94) 20:59:48 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x11f, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:48 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:48 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000ffffffff00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1304.179936] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1304.262271] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:50 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0xa8d2, 0x80000001, 0x9, 0x3, r1}, 0x2c) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000280)=r2, 0x4) openat$cgroup_type(r0, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) 20:59:50 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getpid() setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:50 executing program 5: prctl$intptr(0x510430840000001d, 0xfffffffffffffa6d) prctl$getreaper(0x40400000000001e, &(0x7f0000000040)) 20:59:50 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:50 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x215, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:50 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x209, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:50 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) [ 1306.271758] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:50 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1306.314566] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r1, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6611, &(0x7f0000000080)) [ 1306.390293] device lo entered promiscuous mode 20:59:50 executing program 4: r0 = socket(0xa, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1306.584030] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:50 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'L+'}, 0x28, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}}, 0x5c) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000380)={0x0, {0x2, 0x0, @remote}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0xbc2, 0x0, 0x0, 0x0, &(0x7f0000000100)='tunl0\x00'}) [ 1306.690889] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:51 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:51 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x13c, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 20:59:51 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:51 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x36, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:51 executing program 4: r0 = socket(0x0, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) [ 1306.917191] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000008c0)="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") ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000000)={0x0, 0x6, 0x2}) 20:59:51 executing program 4: r0 = socket(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:51 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:59:51 executing program 5: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)='./file1\x00') [ 1307.050711] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1307.225047] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:51 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1307.297719] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:51 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) [ 1307.461012] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1307.509052] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:51 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x582, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:51 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:51 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000040)=0x80000) 20:59:52 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xc9, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:52 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:52 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80047601, &(0x7f0000000140)) r0 = epoll_create1(0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 20:59:52 executing program 5: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="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", 0xfc) 20:59:52 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:52 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x17e, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:52 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) [ 1307.845955] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:52 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000080)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, {0x1, @remote}, 0x0, {0x2, 0x4e24}, 'veth1_to_bond\x00'}) r1 = getpid() pipe2(&(0x7f0000000000), 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) fsync(r0) read$FUSE(r0, &(0x7f00000002c0), 0x1000) 20:59:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000640), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 20:59:52 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1307.911822] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:52 executing program 4: socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GETFSLABEL(r0, 0x801c6d02, &(0x7f0000000240)) setsockopt$inet_int(r0, 0x0, 0xb306e1f33d41bf0d, &(0x7f0000000080)=0x80000001, 0x4) [ 1308.048393] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1308.081207] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:52 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:52 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpgid(0x0) sched_setscheduler(r0, 0x40000005, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x1000, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socket$nl_route(0x10, 0x3, 0x0) 20:59:52 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:52 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x52, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:52 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x22a, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:52 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:52 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$netlink(r0, &(0x7f0000000080), 0xc) [ 1308.481641] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:52 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1308.753978] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:53 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000001a00)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0xe, 0x3, 0x2}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r1, 0x28}, 0x10) 20:59:53 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) 20:59:53 executing program 2: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) move_pages(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140), 0x6) 20:59:53 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:53 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x13d, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:53 executing program 4: r0 = socket(0xa, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={@empty, @broadcast}, &(0x7f00000001c0)=0xc) [ 1308.930911] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:53 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f0000004200)=[{{&(0x7f0000001300)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x80, &(0x7f0000001840), 0x0, &(0x7f00000018c0)=[{0xe90, 0x0, 0x0, "d072392c74700bcabeda118e31c101ab57965bdb7dc5c3be6aa76e882a3515878e14da06456a91da7dea48fbbe09403a9a6eed0a5b44809d32b8ad82c495392f042934fc84891a20d7e5a4b893b6c4c46b8e092ef9d6891426e50cd294c6cf238a78da5b7722cd3dff75f3e0cd9d5464ee12141512fe96199b6e5dc088806aa7300ae81037cf02c3aad6e27a3e061302ae55cf1e00bcbf07594a0331448a77529c52127aaec7acf90976db18557dea7b434350686b93849938234eb2937d5733a52e446b471c157e1930775b77120ecffed4d93e2d15cbd82bfb36277020bf289c2ee6ad072da7cd005f3816ceb518b605b703bbacae0032816856111583e93aeb457d7bce571f8cf57e166afceb960d9e1c2b8fc0df19ff13ca43937dc2c896a2bcfa6de88cb3f0686e0faf9a47f8b1f7cf989a70aaacdbd506d702b40b8ed0fdb43ae4b10385a08ab902e4ac8f1d7c9c920b1e4c006550e629f90f4fe24d3ed6071fa396148f5bf0d8a3e43b043756f6f6b8aa1d495905f76d18ec88e5aa81352d7bf5b9fd489d85757848747856f00b158e4ae5ee8f1e39b12f194bb658e9c5109ddbee159ff8c5dcfb0e247d6ac4a36abc77185571d854b7035136060020f91dfe2bb16d06ec8f388d8cfec5bf921f2c9ea1cee0439f95ee405dda9c9c39dd4a770c4ac05ad6d8e7a7d8a1b9c6f768cec0ffaf916d123df5945b6c6d74d2ce437e93349d5b88be350c26023cea051cd930d8bacc7337d4a0025fd38c043499c81d9209245e5ddbbb78f0094c877fde13cb46b0fd9aa7047ebc4ad92fcff4e0c0b5ddc0482552e7ba10e6f9f16a9d45a02f0333a2c6abeb2a5ae5933b94edefd5bf7f8f57ca242bf8b82bd1518ea4d431e29d695ad3fa035f60cd1a518bc66ad1fcfe14ae23d6ef3f69d7f5c92044f02238d7393a9b7a5532f73cdeada75a1a401213d3000e6704de69c2d0107ac377ce3e97b17829c5ddd1ae90d4f4a0f53d7dc5339ae593704e4898d1ee8b6aef330e3211294786a15aecf9160c696df09d073cd670d1a3ed7577697f63ed9f4a8ead6878c80ac7b420db19ec63180c63497a486fc75b8a7788180ee9d957e8b8151eacea26b93693ab0ce89fa45a709034614577f4cf4b8c674bfc7a71e25b020872074aa7d5fd895911e3e911c97523adc4c0d27357ca9b063d958b00f1e5d5ace37c628cc17ba6ba3dcb256ae22c56e2c21bfd5b532ebc2a029557d12a49320a1b657f5fa957ddee6e8b36ed9ae73061cf9fcb291c4b3b68130efb1512028295036c6da8c189f8ddc6421de283991df92b07e9dabfda25345817a4ccfb2943ec255e5e133850f591fdeeb9a41e4e51cb9672d5ab40d4199e80b6ea940c4a97ebf627e27df4ea8add663420b7980d9f1daf03ec0f71e50b16d3356d8e625978052c5122c400efdd9ea591b535bcd6655b2c88578d67038c901cea3e69cdddafcd06f260c53834df2e8c6945efda77e2d514495d572da5c5cc3998e76563ed8fbcd3021458376ee07ba8a8d6170e1b394d807f520a02abd57100ea84a2d8c1ddf26ec47064e16a07919b9802f874c3b3182b76b1ffe74939dcc764ce6154e84830139bd5cace8a035c2d6168e3d55ee3fa27ad6fa4bd063298675f95837419c5442c164fc8c4c44fba245ee82ae507e2434be02cb5ce1371b3edad3c0f4d21dfbd282e3a8ba16bc64f8e3eabdf60e91919aba5edb6de5c7ced4a28bf0b32c22382ad33dc2f7e3bd879fe4ed03b1fd3b568e8f43c91a0cad9ca473d2ae9d7ddfec255863d27aaec3b3e0e10131a36bd73b8173f2422d368f4bc086762c5b07f4e349ac33acfb72de05e3fadbf320ac21b2d92398c4658a98228c65e58d05ac9aaf0082672a5decf00b2c54fa550d2548b97f9a973e5fc25e458e5270cc4b658aae6b6f8485cd1b7ccb08aec4d9daf3b0a573add8bccef59f3209f857259e02cd9d1c5159d6a357bf546c4670829d1e51caa758b8fa5155bf24e58a7d24b3fd8675602725544a1475f437b50705ef898c78a05ff8aa69360cb8d4faf5ed910bab4c6bfad6dee3074ceae7e13171e3ca304a2d9268a8eba5d96c8e4e50fd52992f3347f2b04970ebb4beb7980165af26324f221795df87abaa3ec87fa64e33da268b8d4559dfe1a99a8a00c6520ad83f5d729c93f61fd02d0209356b2dc0e447aa9991776535d73c8faf2aac20c8014014be5a66f6f7aa3d1cb61152941cb7ca2ad115475b78031e387e95ce715f1ddfae659f4f435e38aeae5d4e732de08aa4b59b7e81b6e74d5dac389e99a5dc89b1bb4d76f0d86af5f5e48e99ac8561a7b5e0810499ba2c400cf877f8ae4754cd1c302ee1b236dca10fb472fdfaccc6c1661a1efac89e4c713f5d79af72ebfe0677825e7d5547d58f077b8602d00f3481fd68a354e75636b119bf1662652a8d29dc3d3df3c71ac55376a5095134d746b0785d3183daef05918beb9c3294dc9e4340c8d1be1efd0c29d4054b34a0e038b73b8a85008704222bcca74c84a6f2449ea20e5b399010b6b118b4c964d48756dcf62b2ff5704cb0268c820afd101923df85d93553e052d31baefb6441b6acd3f433783f919829eeeb67b4acab0e564619f320a96069106574b0badce2687d0eccedbbc3be0311ce0cfc529f4e4fa4d15c51e0471f70d3e41dcc996ccf14b600d48e94f4e9ba9dd3ddd40bd879659fa61dd968b9a4ad6e2fb6d82f74edde3b5d0167cb30a148dc84b9911ad0d7f84fc9fc0a2f89a99206fe0ecf84dbcc204f37539115fdbdf1db04f0fbd27424d7b9da3832a2ec512da4153c404bb90ec98ac89ff779598f5dadbe2d12db015fc1b764650232f49a3cd5306b40a0c126bfc9908bc9b628f8d37337109fd84d004ba6dfc243b42ad509217d5828858c478a84935039fe6a56106ef3cdfe03acba96467b111d3048b26e292865fff900495e0d7bcd0eb911381439c3bed05da2fc531c4c0a3672aa572767b19a85967d2c415c9a20307eadfeba38f20f0f4abba33473453e1a504867b412f1eb0f0587fa7c008918f6fb71be74a6bb10ad6bb408ffdcc750e93cef6bd0a24800ea9a2d2b0d82577038ba8e010015714def56c5435f3d492cafcd6a7ff497152357fe594405d8ca6ea1a59e1b6079444bab08137571fcc8e91eee9cee966cd10ad57a6c20ba49618018c3b7761b59e42224c84467561e57d4c0165b1bc62a4ecdd185c8fc1c9888da7f213dcd2879467fb8ca504402add0081e18238e40a8f24e9c15db2d0f8038dd2af709123b4fe297073ee7e17207be7f9d67f23160e5c27a630764d181dcf6e36e4eb413a163baa4418c2b9525ec40bc85d0673025105397b41b9253ec9bd38784bb73216b49938e41d22b241e95eb4c3e9bb83e1f70ea1ac3d8af903a9b404b694a55c8a464398e6d09f29813afd00ef23c4f521157b25a0c11bd6ab5c3d0fac928de7795cf9dafc587353b8153ac4a90e21af721659a21f8cc392db06dfa26e8638b6d91b2941185e74c98e8d7251c4ef8c50eff449710d517d7283b82d1577e13c8477c6a3ab506adf3d1c060573ae8d27864e43b00cc5199a62292a32fbfaff0b7a3f84ae3efd8a26db13be68492fa08dacfc4168815f4948670834a01712e0bd625694599ee11004aa2d6d9b87b70075836b6507c32d2c04db17c3a97a5f8e6f74fdf1f02d54564573698f642092652d8f0e8e1df0b4512b2eb6ec6780a62bed94aa36c30e370012bddfabc5e273bbf908c52e8a1cc03ce19a5a8b1e6153aa8e1d8ad033ee81e708335d6b5ac5d8ba20cc3f1ccca29776d5350959f6cdec81364538bd50682b7bf1e0086f1ce076d638ff5ef576a134642a386881b83dcc94ee0d5201374a96cb47f7da105ac148730cb3f70839d93170de1b8a971f02c17c0a749b5aa55348c9920c704f2d3ca946d8fa8e9c46b254f33c9016427e09ff576e3788a5588f01316ed055fdbdfcf8d0a70bc3b0d7e3bee31f6639a0655363898143b391862332e081a087d4c23105fbafa6c823a507f688d3104ec3869c13f378d6390aa72a0fb2727a3dfc41f67cc5402bd7a2dece46b0e6073cf11c0c13a5420017a3f5187c59556c5893ece9622863d19e395aacd094b2e2b5e3389891e44c1cbcc457fa90afbaf8bbd6731738d2cea42be7f8da1ef83421512dda90aac3fc5ae27bc710bb59302793ce64bf2bf3f438973ef7ccaae4a02faac6a8952c2e094eb4f82d5abe56166c22c6357b278818cf0461a3e38721c44ba08e141055eed097fa3ba01faad19a605588980e2586712b89167f461563a03d68ad5fd9ce362e51568776430ac846f4a5500627182006e04de248781cc5c449d635a02c8331868026edf2ef4232acadf4abf22942f0da7138fd039474af530558b5ea3a13417f276d6ccff672d5c5ef165437352a3a79c61aea176d43aa149ba46ff83bf5873f7fb086e1db586c8bfac5a53a4caca0513f427f245562c5c15da0f8aafec9208bba66f8d83cbcd53fe050506af0980667b881c4888526948ad1bc6550d3a6a747cb961b144c31646b9eb0b64d6cf6d8530be9ff6b7c62e687e614fb4f0bea19879f6f5a4c2eccbca180db6fa81c512536cf7d3e14ee97a0f171f840288926b5a5a3a0384f25cb905522b6fb54ecca76ba10b4c7de37967f06a3b94b56858f5bcbaae9d97faac20644a8ad858dd5b006368d46cd29aaa83500af765e8dd3bc072e59e2842cdf4363bd9e5930f6e9a08fe57e885fc72460214e374514adb3a64d6475cbdd514b5d07bbc35486f19380eb3c0ec3b31e23e9af65db31945e368c9871026c7279199eb27b6a99616bf10b9c920230876aa0be78d3c49a2af89ed52ee405d0c8a25636e4654932622ab0fa78c753de0b00cec490e68ea3d7ed7de410dda1c329ee9737980ec8cefd5bcc98e6d21f6e74e95bfd176ca78fcdc2611139d96aaede18e8d6b752e07a00e4b2344eea26d8c9061dc37e9f566314073a009e41f393d539a49e5199ac486c58605cf45ad08a99126e1d00b1a64f908bffb0c6d19d8b7bd89a90c6a79a721d0b8178849463e8e0a52a8f6236ee6f551ab903b955ea867427e801bfa12275acdab55bd4d733ba8568b40008ae5d2d6e404cd87027dfba287f71f5fa81a3bfdd23d2391879ed8c4b2466affd442470b360bfc9af3c92963af729ec30a40b2b38bc77579379bfe4b4ea95de62fb519f3a8eee22921db9f02277acd36b25c8708c543b8eb09f1c"}], 0xe90, 0x4040004}, 0x3}], 0x1, 0x0) 20:59:53 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xc8, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:53 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:53 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) inotify_init() sendfile(r2, r1, &(0x7f0000000080), 0xfffffffffffffffc) 20:59:53 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000db4fb6)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @icmp=@timestamp}}}}, &(0x7f0000ea3000)) 20:59:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0xc020660b, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)) 20:59:53 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xf7, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1309.307779] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:53 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000080)={{0x6, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1}}, 0x44) 20:59:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180800000000000000000000028000007a0a00ffffffff00731130"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xb, 0x3, &(0x7f0000000040)=@framed={{}, [], {0x95, 0x0, 0x0, 0x31000000}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000300)=""/187}, 0x48) 20:59:53 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = getpgid(0x0) sched_setscheduler(r0, 0x40000005, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x1000, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socket$nl_route(0x10, 0x3, 0x0) 20:59:53 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:53 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r1, r0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0xb) 20:59:53 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setrlimit(0x8000000007, &(0x7f0000000000)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockname$netlink(r1, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) epoll_create1(0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000000c0)={0x2e, @remote, 0x4e23, 0x0, 'sed\x00'}, 0x2c) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000040)) geteuid() ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 20:59:54 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1b7, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:54 executing program 5: 20:59:54 executing program 4: 20:59:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000340)=ANY=[@ANYBLOB="e0e6ff0100000014060000000000b1000000000000000000"], 0x1) 20:59:54 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xc, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f00000001c0)=""/220, &(0x7f0000000140)=0xdc) sched_setscheduler(r2, 0x5, &(0x7f0000000000)) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)="b50e7f", 0x3) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) 20:59:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 20:59:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x2}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000012c0)=@can, 0x80, &(0x7f0000001840)}}], 0x1, 0x0) 20:59:54 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000000c0)="f8f550e6", 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) read(r1, &(0x7f0000000100)=""/254, 0xfe) 20:59:54 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:54 executing program 5: socketpair$unix(0x1, 0x40002, 0x0, &(0x7f0000000200)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000000c0)="f8f550e6", 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) read(r0, &(0x7f0000000100)=""/254, 0xfe) 20:59:54 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) fadvise64(r0, 0x0, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) [ 1310.834166] IPVS: ftp: loaded support on port[0] = 21 20:59:55 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1c2, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) accept(r0, &(0x7f0000000440)=@ipx, &(0x7f00000004c0)=0x80) 20:59:55 executing program 5: socketpair$unix(0x1, 0x40002, 0x0, &(0x7f0000000200)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000000c0)="f8f550e6", 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) read(r0, &(0x7f0000000100)=""/254, 0xfe) 20:59:55 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1cb, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:55 executing program 2: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000240)="1db510774375f47a05942c459e810c73fdf5623fb1eea51ac1e04c0907bc6c8326e016c477b652f66bcff5828246a8c69e7a40e2aa1197a1d13cb6162194e50a799882e500", 0x45, r0) perf_event_open(&(0x7f0000001700)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$search(0xa, r0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, 0x0) [ 1311.179537] device bridge_slave_1 left promiscuous mode [ 1311.185261] bridge0: port 2(bridge_slave_1) entered disabled state 20:59:55 executing program 2: [ 1311.261956] device bridge_slave_0 left promiscuous mode [ 1311.269523] bridge0: port 1(bridge_slave_0) entered disabled state 20:59:55 executing program 4: 20:59:55 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) prctl$getreaper(0x34, &(0x7f0000000000)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f0000000040)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) 20:59:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'lo\x00', 0x0}) sendto$packet(r2, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x8100, r3, 0x1, 0x0, 0x6, @remote}, 0x14) [ 1311.531132] team0 (unregistering): Port device team_slave_1 removed [ 1311.578445] team0 (unregistering): Port device team_slave_0 removed [ 1311.604293] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1311.665395] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1311.751145] bond0 (unregistering): Released all slaves [ 1312.271089] bridge0: port 1(bridge_slave_0) entered blocking state [ 1312.277566] bridge0: port 1(bridge_slave_0) entered disabled state [ 1312.285448] device bridge_slave_0 entered promiscuous mode [ 1312.330497] bridge0: port 2(bridge_slave_1) entered blocking state [ 1312.336986] bridge0: port 2(bridge_slave_1) entered disabled state [ 1312.344443] device bridge_slave_1 entered promiscuous mode [ 1312.388703] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1312.434984] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1312.583641] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1312.632794] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1312.851520] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1312.859038] team0: Port device team_slave_0 added [ 1312.902919] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1312.911002] team0: Port device team_slave_1 added [ 1312.955322] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1312.962525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1312.979525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1313.019313] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1313.065903] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1313.073195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1313.090452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1313.115456] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1313.122699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1313.130930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1313.473851] bridge0: port 2(bridge_slave_1) entered blocking state [ 1313.480259] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1313.486844] bridge0: port 1(bridge_slave_0) entered blocking state [ 1313.493273] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1313.500494] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1313.798902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1314.439528] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1314.531264] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1314.620831] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1314.627057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1314.635689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1314.725875] 8021q: adding VLAN 0 to HW filter on device team0 20:59:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:59 executing program 5: socketpair$unix(0x1, 0x40002, 0x0, &(0x7f0000000200)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000000c0)="f8f550e6", 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) read(r0, &(0x7f0000000100)=""/254, 0xfe) 20:59:59 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) prctl$getreaper(0x34, &(0x7f0000000000)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f0000000040)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) 20:59:59 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x53, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:59 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xb5, &(0x7f00000011c0)}}], 0x249, 0x0) 20:59:59 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x4e23, 0xffffffffffffffaa, 0xa}, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x5}, {}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@mcast1}, 0x0, @in=@multicast1, 0x0, 0x0, 0x3, 0x0, 0x800, 0x0, 0x100}}, 0xe8) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040), 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x80000000000040, &(0x7f0000000080), 0x5c206f9640e7a35d) [ 1315.256789] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1315.266525] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f00000049c0)=[{{&(0x7f00000001c0)=@ipx={0x4, 0x0, 0x0, "7bd205349ace"}, 0x80, &(0x7f0000000240)}}], 0x1, 0x80) 20:59:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000ffffffff00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 20:59:59 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) prctl$getreaper(0x34, &(0x7f0000000000)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f0000000040)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) 20:59:59 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) prctl$getreaper(0x34, &(0x7f0000000000)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f0000000040)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) [ 1315.504721] kernel msg: ebtables bug: please report to author: No valid hooks specified 20:59:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f00000049c0)=[{{&(0x7f00000001c0)=@ipx={0x4, 0x0, 0x0, "7bd205349ace"}, 0x80, &(0x7f0000000240)}}], 0x1, 0x80) 20:59:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1315.551665] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1315.695839] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1315.767978] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1315.923016] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1315.983102] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:00 executing program 5: 21:00:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1ca, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:00 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x14a, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1316.168186] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1316.211769] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:00 executing program 5: 21:00:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1316.344142] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1316.376796] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:00 executing program 5: [ 1316.510403] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1316.563471] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:01 executing program 2: 21:00:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:01 executing program 5: 21:00:01 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x3b, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:01 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xd9, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:01 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f00000049c0)=[{{&(0x7f00000001c0)=@ipx={0x4, 0x0, 0x0, "7bd205349ace"}, 0x80, &(0x7f0000000240)}}], 0x1, 0x80) 21:00:01 executing program 5: [ 1317.201912] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1317.249390] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:01 executing program 5: 21:00:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:01 executing program 5: [ 1317.468221] IPVS: ftp: loaded support on port[0] = 21 [ 1317.510962] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1317.523430] IPVS: ftp: loaded support on port[0] = 21 21:00:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1317.556414] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1317.655875] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1317.681451] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1319.329329] device bridge_slave_1 left promiscuous mode [ 1319.334920] bridge0: port 2(bridge_slave_1) entered disabled state [ 1319.381540] device bridge_slave_0 left promiscuous mode [ 1319.387031] bridge0: port 1(bridge_slave_0) entered disabled state [ 1321.317814] team0 (unregistering): Port device team_slave_1 removed [ 1321.327902] team0 (unregistering): Port device team_slave_0 removed [ 1321.340050] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1321.392618] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1321.449127] bond0 (unregistering): Released all slaves [ 1321.678078] bridge0: port 1(bridge_slave_0) entered blocking state [ 1321.684948] bridge0: port 1(bridge_slave_0) entered disabled state [ 1321.697685] device bridge_slave_0 entered promiscuous mode [ 1321.786069] bridge0: port 1(bridge_slave_0) entered blocking state [ 1321.799146] bridge0: port 1(bridge_slave_0) entered disabled state [ 1321.806649] device bridge_slave_0 entered promiscuous mode [ 1321.816972] bridge0: port 2(bridge_slave_1) entered blocking state [ 1321.833572] bridge0: port 2(bridge_slave_1) entered disabled state [ 1321.850147] device bridge_slave_1 entered promiscuous mode [ 1321.883902] bridge0: port 2(bridge_slave_1) entered blocking state [ 1321.909843] bridge0: port 2(bridge_slave_1) entered disabled state [ 1321.919542] device bridge_slave_1 entered promiscuous mode [ 1321.946063] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1321.986302] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1322.022767] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1322.067800] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1322.261299] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1322.301740] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1322.372183] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1322.392837] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1322.539181] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1322.546065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1322.557755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1322.573894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1322.811723] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1322.819940] team0: Port device team_slave_0 added [ 1322.829858] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1322.838476] team0: Port device team_slave_0 added [ 1322.908653] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1322.916463] team0: Port device team_slave_1 added [ 1322.925541] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1322.933383] team0: Port device team_slave_1 added [ 1322.961864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1322.991956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1323.015036] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1323.069667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1323.082478] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1323.090859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1323.109852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1323.148149] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1323.155855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1323.179849] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1323.191699] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1323.200075] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1323.210587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1323.267100] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1323.274562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1323.283464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1323.784265] bridge0: port 2(bridge_slave_1) entered blocking state [ 1323.790712] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1323.797492] bridge0: port 1(bridge_slave_0) entered blocking state [ 1323.803976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1323.811647] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1323.832062] bridge0: port 2(bridge_slave_1) entered blocking state [ 1323.838485] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1323.845266] bridge0: port 1(bridge_slave_0) entered blocking state [ 1323.851708] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1323.859955] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1323.999733] device bridge_slave_1 left promiscuous mode [ 1324.005294] bridge0: port 2(bridge_slave_1) entered disabled state [ 1324.069737] device bridge_slave_0 left promiscuous mode [ 1324.075206] bridge0: port 1(bridge_slave_0) entered disabled state [ 1324.140766] team0 (unregistering): Port device team_slave_1 removed [ 1324.151771] team0 (unregistering): Port device team_slave_0 removed [ 1324.162583] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1324.223041] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1324.300070] bond0 (unregistering): Released all slaves [ 1324.599497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1324.619346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1326.562093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1326.589230] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1326.725804] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1326.748529] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1326.885508] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1326.892182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1326.908185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1326.918587] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1326.925470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1326.933382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1327.072376] 8021q: adding VLAN 0 to HW filter on device team0 [ 1327.083519] 8021q: adding VLAN 0 to HW filter on device team0 21:00:12 executing program 2: 21:00:12 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x112, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:12 executing program 5: 21:00:12 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:12 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xc1, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:12 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f00000049c0)=[{{&(0x7f00000001c0)=@ipx={0x4, 0x0, 0x0, "7bd205349ace"}, 0x80, &(0x7f0000000240)}}], 0x1, 0x80) 21:00:12 executing program 5: [ 1328.120310] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:12 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1328.190207] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:12 executing program 2: 21:00:12 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:12 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000002340)='/dev/snapshot\x00', 0x42201, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) write$P9_RVERSION(r0, &(0x7f0000000100)=ANY=[], 0x0) [ 1328.314551] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1328.353266] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:12 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000feffff0700"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:12 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000002340)='/dev/snapshot\x00', 0x42201, 0x0) write$P9_RVERSION(r0, &(0x7f0000000100)=ANY=[], 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000080), 0xa) [ 1328.495331] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:13 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x22b, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:13 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:13 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x40045568) 21:00:13 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x37, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:13 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:13 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1328.809991] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:13 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:13 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e40200064"], 0x1) 21:00:13 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:13 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1329.052059] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e40200064"], 0x1) 21:00:13 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:13 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:13 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:13 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xcd, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:13 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:13 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e40200064"], 0x1) [ 1329.543972] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:13 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:13 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:13 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:13 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:14 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e40200064"], 0x1) [ 1329.790387] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:14 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:14 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:14 executing program 5: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e40200064"], 0x1) 21:00:14 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:14 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:14 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:14 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xc5, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:14 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x79, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:14 executing program 5: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e40200064"], 0x1) 21:00:14 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1330.297967] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:14 executing program 5: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e40200064"], 0x1) 21:00:14 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:14 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:14 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:14 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:14 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e40200064"], 0x1) [ 1330.538408] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:14 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:14 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e40200064"], 0x1) [ 1330.751691] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:15 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xdd, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:15 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:15 executing program 2: write(0xffffffffffffffff, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:15 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:15 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e40200064"], 0x1) 21:00:15 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x3c, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:15 executing program 2: write(0xffffffffffffffff, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:15 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1331.099251] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[], 0x0) 21:00:15 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080), 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:15 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:15 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:16 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x37, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:16 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a422", 0x24) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:16 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:16 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x193, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[], 0x0) 21:00:16 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72", 0x36) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:16 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[], 0x0) 21:00:16 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72", 0x36) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:16 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:16 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72", 0x36) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:16 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1332.595852] IPVS: ftp: loaded support on port[0] = 21 21:00:16 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x2b, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB], 0x1) 21:00:16 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000", 0x3f) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:16 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1b, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1332.709101] device bridge_slave_1 left promiscuous mode [ 1332.714684] bridge0: port 2(bridge_slave_1) entered disabled state 21:00:17 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000", 0x3f) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1332.760413] device bridge_slave_0 left promiscuous mode [ 1332.767434] bridge0: port 1(bridge_slave_0) entered disabled state 21:00:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB], 0x1) 21:00:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:17 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000", 0x3f) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB], 0x1) 21:00:17 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f", 0x44) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1333.030617] team0 (unregistering): Port device team_slave_1 removed [ 1333.109687] team0 (unregistering): Port device team_slave_0 removed [ 1333.159243] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1333.215308] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1333.370842] bond0 (unregistering): Released all slaves [ 1333.976041] bridge0: port 1(bridge_slave_0) entered blocking state [ 1333.982975] bridge0: port 1(bridge_slave_0) entered disabled state [ 1333.991093] device bridge_slave_0 entered promiscuous mode [ 1334.036546] bridge0: port 2(bridge_slave_1) entered blocking state [ 1334.043134] bridge0: port 2(bridge_slave_1) entered disabled state [ 1334.051136] device bridge_slave_1 entered promiscuous mode [ 1334.097764] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1334.143957] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1334.283817] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1334.333762] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1334.572550] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1334.580077] team0: Port device team_slave_0 added [ 1334.625157] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1334.632790] team0: Port device team_slave_1 added [ 1334.678366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1334.708650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1334.740538] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1334.747556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1334.757272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1334.800606] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1334.807750] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1334.825427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1335.133840] bridge0: port 2(bridge_slave_1) entered blocking state [ 1335.140251] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1335.146847] bridge0: port 1(bridge_slave_0) entered blocking state [ 1335.153264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1335.160659] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1335.468882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1336.131608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1336.227299] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1336.322061] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1336.328218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1336.336093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1336.431770] 8021q: adding VLAN 0 to HW filter on device team0 21:00:21 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000040000"], 0x1) 21:00:21 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f", 0x44) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:21 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x19e, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:21 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x4d, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:21 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f", 0x44) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1337.005808] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1337.016193] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:21 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000040000"], 0x1) [ 1337.109763] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1337.131449] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:21 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683", 0x46) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:21 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683", 0x46) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1337.261972] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000040000"], 0x1) 21:00:21 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683", 0x46) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1337.362035] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:21 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) [ 1337.575574] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf"], 0x1) [ 1337.644035] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:22 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1e4, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:22 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2", 0x47) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:22 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xb3, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:22 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf"], 0x1) 21:00:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf"], 0x1) 21:00:22 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) [ 1337.860836] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1337.881623] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:22 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c"], 0x1) [ 1338.093748] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) [ 1338.169078] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:22 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x118, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:22 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:22 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1c1, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:22 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x10, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c"], 0x1) 21:00:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) [ 1338.458971] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1338.506945] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:22 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:22 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c"], 0x1) 21:00:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:22 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000000ffffffff00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) [ 1338.973441] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1339.021203] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:23 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x43, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c2"], 0x1) 21:00:23 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x163, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:23 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:23 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c2"], 0x1) [ 1339.274187] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c2"], 0x1) [ 1339.333411] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:23 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:23 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1339.543305] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1339.603956] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:23 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x113, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e4020"], 0x1) 21:00:24 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1ae, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:24 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e4020"], 0x1) [ 1339.926401] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e4020"], 0x1) 21:00:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) [ 1339.969829] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:24 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) [ 1340.147228] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e402000"], 0x1) [ 1340.228313] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:24 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x6f, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {0x6}]}, 0x10) 21:00:24 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x19c, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e402000"], 0x1) 21:00:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f0000000000)=[{0x2}]}, 0x10) 21:00:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000035c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000000400000000000000580200005802000058020086c8e63baf026c07000100006413000c66dfac61c20e402000"], 0x1) 21:00:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x2}, {}]}, 0x10) 21:00:25 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) request_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100), &(0x7f0000000140)=',keyring\x00', 0xfffffffffffffffb) [ 1340.995673] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:25 executing program 5: 21:00:25 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x69, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000feffff0700"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:25 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000080)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd387291010eac9ab972a4220ab39720fe2c59e090b66f8fc48c26002c72a757a85b0700000000000000023f0683a2aa", 0x48) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) 21:00:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) 21:00:25 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x171, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1341.552564] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:25 executing program 5: 21:00:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) 21:00:26 executing program 5: [ 1341.887001] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:26 executing program 5: [ 1341.937027] IPVS: ftp: loaded support on port[0] = 21 21:00:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) 21:00:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1342.050717] device bridge_slave_1 left promiscuous mode [ 1342.056491] bridge0: port 2(bridge_slave_1) entered disabled state [ 1342.141442] device bridge_slave_0 left promiscuous mode [ 1342.146989] bridge0: port 1(bridge_slave_0) entered disabled state [ 1342.149956] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1342.314153] team0 (unregistering): Port device team_slave_1 removed [ 1342.353507] team0 (unregistering): Port device team_slave_0 removed [ 1342.368134] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1342.413012] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1342.481473] bond0 (unregistering): Released all slaves [ 1343.243575] bridge0: port 1(bridge_slave_0) entered blocking state [ 1343.250438] bridge0: port 1(bridge_slave_0) entered disabled state [ 1343.257887] device bridge_slave_0 entered promiscuous mode [ 1343.306783] bridge0: port 2(bridge_slave_1) entered blocking state [ 1343.313397] bridge0: port 2(bridge_slave_1) entered disabled state [ 1343.337336] device bridge_slave_1 entered promiscuous mode [ 1343.383733] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1343.431056] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1343.591753] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1343.641702] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1343.689497] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1343.696435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1343.744716] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1343.751726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1343.848056] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1343.855288] team0: Port device team_slave_0 added [ 1343.885400] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1343.892999] team0: Port device team_slave_1 added [ 1343.938571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1343.980655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1344.010441] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1344.017497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1344.026202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1344.072504] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1344.079761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1344.087797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1344.370835] bridge0: port 2(bridge_slave_1) entered blocking state [ 1344.377203] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1344.383926] bridge0: port 1(bridge_slave_0) entered blocking state [ 1344.390317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1344.397708] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1344.589078] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1345.366147] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1345.456944] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1345.548148] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1345.554484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1345.562221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1345.656402] 8021q: adding VLAN 0 to HW filter on device team0 21:00:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{}, {0x6}]}, 0x10) 21:00:30 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "00000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:30 executing program 5: 21:00:30 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x91, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:30 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x21e, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000080)={0x10}) 21:00:30 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000600], 0x0, &(0x7f00000002c0), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) [ 1346.254000] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:30 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x10, 0x0, 0x10000) 21:00:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{}, {0x6}]}, 0x10) [ 1346.305544] kernel msg: ebtables bug: please report to author: bad policy 21:00:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x10000000000006, 0x0, 0x0, 0x101}]}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0xfffffffffffffe64, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 1346.363824] kernel msg: ebtables bug: please report to author: bad policy 21:00:30 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{}, {0x6}]}, 0x10) 21:00:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f0000000080)=""/75, &(0x7f0000000100)=0x4b) [ 1346.554724] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1346.566247] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:00:30 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000007fffffe00"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:30 executing program 4: [ 1346.831777] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:31 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:31 executing program 2: 21:00:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x101, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="040400000700000000000000fff55b4202938207d9fb3780", 0x18, 0x0, &(0x7f0000000240)={0xa, 0x200800800, 0x20000000001, @mcast1}, 0x1c) 21:00:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x10000000000006, 0x0, 0x0, 0x101}]}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0xfffffffffffffe64, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 21:00:31 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x173, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:31 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x186, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:31 executing program 2: prctl$intptr(0x1d, 0xfffffffffffff4f5) prctl$intptr(0x1e, 0x0) [ 1347.051636] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:31 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 21:00:31 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) request_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000140)=',keyring\x00', 0xfffffffffffffffb) 21:00:31 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80047601, &(0x7f0000000140)) r0 = epoll_create1(0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000180)) 21:00:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x49, &(0x7f0000000180)=ANY=[], 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) setuid(r2) 21:00:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000520007031dfffd946fa2830020200a0005000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r1, &(0x7f000000a6c0)=[{{&(0x7f0000005c80)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000001980)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f000000a940)={0x77359400}) 21:00:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 21:00:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x800000020000003, &(0x7f0000000040)={0xa, 0x6bb, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 21:00:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 21:00:32 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1da, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000200), 0xc, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0xa3bc010931239d7f, 0x0, 0x0, {0x2, 0x0, 0x10}}, 0x20}}, 0x0) 21:00:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) [ 1347.882052] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 21:00:32 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:32 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) fchown(r1, 0x0, 0x0) 21:00:32 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x12b, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:32 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)={0x2, 0x100}) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) unshare(0x400) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x0) 21:00:32 executing program 2: r0 = creat(&(0x7f0000003280)='./bus\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000000c0)=@sco={0x1f, {0x0, 0x0, 0x81, 0x0, 0x20}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000340)="65ab6633ee0a9d0045a515a83920f9b9f10abab1175879beaaf01a69a685cd8876af1e563f856613cee0182bfd28d052c6c40c96651898ff8bebc39e12c6cd362d6832a8fabf57421adbcc6930fd9b6333f1a0c0d9198d6dff06f77f324d23c866e749e85ab4bddeee3a24550f648d9921adef7857f65ab5bb6b5ca5997799e117e33c8aa2b6ae8a8b5b08abc862605777d43ada6631efc980e0fce38231ba12b01eda81f722e7e6bbde859e069767d6052c06066ddd482025c585453e570566a4337859d7d5265aa332035f602ee9234193d911513bf3ecbc36347aad06a6b97b9cf9cfa6a9fa", 0xe7}], 0x1, 0x0, 0x0, 0x8014}, 0x8800) 21:00:32 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x1, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x00!\x00', &(0x7f0000000080)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "8e4bfa"}}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 21:00:32 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000380)}}, {{&(0x7f00000000c0)=@in={0x2, 0x0, @local}, 0x1b8, &(0x7f0000000240), 0x0, &(0x7f0000000480), 0x32}}], 0x2, 0x0) 21:00:32 executing program 4: ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000001c0)={0x9}) clone(0x2382001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/70, 0x46) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x400000200000ec) 21:00:32 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) [ 1348.183084] raw_sendmsg: syz-executor5 forgot to set AF_INET. Fix it! 21:00:32 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x161, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x8200}], 0x1, &(0x7f00000000c0)={0x0, r1+30000000}, &(0x7f0000000200), 0x8) 21:00:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'lo\x00', 0x0}) sendto$packet(r2, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x8100, r3, 0x1, 0x0, 0x6, @remote}, 0x14) [ 1348.464159] IPVS: ftp: loaded support on port[0] = 21 [ 1348.555672] device bridge_slave_1 left promiscuous mode [ 1348.561527] bridge0: port 2(bridge_slave_1) entered disabled state [ 1348.610625] device bridge_slave_0 left promiscuous mode [ 1348.616196] bridge0: port 1(bridge_slave_0) entered disabled state [ 1348.785451] team0 (unregistering): Port device team_slave_1 removed [ 1348.802780] team0 (unregistering): Port device team_slave_0 removed [ 1348.815728] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1348.862811] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1348.920420] bond0 (unregistering): Released all slaves [ 1349.608579] bridge0: port 1(bridge_slave_0) entered blocking state [ 1349.615480] bridge0: port 1(bridge_slave_0) entered disabled state [ 1349.623612] device bridge_slave_0 entered promiscuous mode [ 1349.670752] bridge0: port 2(bridge_slave_1) entered blocking state [ 1349.677239] bridge0: port 2(bridge_slave_1) entered disabled state [ 1349.685446] device bridge_slave_1 entered promiscuous mode [ 1349.732639] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1349.777598] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1349.919545] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1349.968570] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1350.057030] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1350.064045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1350.203630] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1350.211298] team0: Port device team_slave_0 added [ 1350.256734] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1350.264315] team0: Port device team_slave_1 added [ 1350.309783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1350.340449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1350.372519] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1350.379741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1350.387623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1350.431842] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1350.439190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1350.447407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1350.769978] bridge0: port 2(bridge_slave_1) entered blocking state [ 1350.776405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1350.783109] bridge0: port 1(bridge_slave_0) entered blocking state [ 1350.789500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1350.796795] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1351.029014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1351.738603] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1351.828406] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1351.921697] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1351.927830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1351.936055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1352.026530] 8021q: adding VLAN 0 to HW filter on device team0 21:00:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:36 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) pwritev(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000001480)}], 0x1, 0x0) 21:00:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000200), 0xc, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0xa3bc010931239d7f, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, 0x20}}, 0x0) 21:00:36 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000740)='/dev/net/tun\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) 21:00:36 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x205, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:36 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x162, &(0x7f00000011c0)}}], 0x249, 0x0) [ 1352.566324] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1352.575518] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:36 executing program 5: pipe(&(0x7f0000000000)) syz_open_pts(0xffffffffffffff9c, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() getuid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) epoll_create(0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000080), 0xa68e13844ace6b2) 21:00:36 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r2) dup3(0xffffffffffffffff, r0, 0x80000) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x14000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}]}, 0x20}}, 0x0) [ 1352.627189] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 1352.645500] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1352.693066] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000000)={&(0x7f0000000140)={0x14, 0x42, 0x105}, 0x14}}, 0x0) 21:00:37 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000680)={{0xffffffffffffffff}, 0x0, 0x0, 'id1\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x0, 0x7f}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000340)=""/40, &(0x7f00000001c0)=0x28) [ 1352.845533] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:37 executing program 5: unshare(0x400) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x90, [0x20000380, 0x0, 0x0, 0x200005a8, 0x200005d8], 0x0, &(0x7f0000000080), &(0x7f0000000380)=[{}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x108) [ 1352.911317] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:37 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) lseek(r0, 0x63, 0x1) 21:00:37 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000002c0)) lseek(0xffffffffffffffff, 0xfffffffffffffffe, 0x0) 21:00:37 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) shutdown(0xffffffffffffffff, 0x0) [ 1353.087158] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1353.101996] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1353.142315] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:37 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xe0, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:37 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x7c, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:37 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) 21:00:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:37 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000540)="6e730066827d7232f2f07c3c1485481cbab6064192f9cc848fd27e8c8472edcaea1539f07ba9c635d0adad1884ed220ce5026bcd6b1f4e63728dfd1b69b6af2a4c9a5f77228d3f448f5b30d9b8be5e899ff8eda1e7e1944afd2d8485d9a415cfad507e4eb3918f3a91e5bb8d1432947d65982a482f4243dd2c6c6dbd88f58575c74323267409a928583a3695f4cd8f77588fd3de55fd9a4a2cdb15aa64b34c528a586e13559342d838d5f0c0246fec9a7a84a133e1ab73e59b17fa4a00ac63ae3740e1028568aba3000dcef4495dc6a4a9dde93176c5dc3a4c5bc8e4ebe160fa6c8e") exit(0x0) fstat(r0, &(0x7f0000000180)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000000100)=@nl=@unspec, 0x4e, &(0x7f0000000040), 0x0, &(0x7f0000000c80)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000002fc0)={0x77359400}) 21:00:37 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x3, &(0x7f0000000280)={0x0, 0x0, 0x1}, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) timer_delete(0x0) 21:00:37 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) dup3(r0, r1, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)) [ 1353.407368] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1353.446034] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:37 executing program 4: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) r0 = socket$inet6(0xa, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) 21:00:37 executing program 4: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) r0 = socket$inet6(0xa, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) [ 1353.649313] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000000300"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1353.696957] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:38 executing program 4: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) r0 = socket$inet6(0xa, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) [ 1353.895207] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1353.905934] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:38 executing program 4: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) r0 = socket$inet6(0xa, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) 21:00:38 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) pipe(&(0x7f0000000280)) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev_mcast\x00') r1 = getpid() write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x71, 0x0, {{0x0, 0x2}, 0x1}}, 0x18) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) lseek(r0, 0xfffffffffffffffe, 0x0) 21:00:38 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xd, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:38 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000000000000000100"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1354.057889] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1354.073274] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffe}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 21:00:38 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x131, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:38 executing program 4: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) r0 = socket$inet6(0xa, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) 21:00:38 executing program 2: keyctl$join(0x1, &(0x7f0000003340)) keyctl$session_to_parent(0x12) 21:00:38 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:38 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1be, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:38 executing program 4: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) r0 = socket$inet6(0xa, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) [ 1354.270851] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xffffffffffffffff, 0x11, r2, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='trusted.overlay.impure\x00', &(0x7f0000000040)='/dev/kvm\x00', 0x9, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:00:38 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1354.343805] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:38 executing program 4: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) r0 = socket$inet6(0xa, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) [ 1354.470538] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:38 executing program 4: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) r0 = socket$inet6(0xa, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) [ 1354.543254] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:38 executing program 4: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) 21:00:39 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f000002aff0)=[{&(0x7f0000010000)="5500000020007fafb72d13b2a4a2809302000000030343026c26236925000400fd7f0000bd2dca8a9848a3c728f1c46b7b31afdc1338d544000000006826f75ae583de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000001c0)}, 0x0) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140), &(0x7f0000000180), 0x0, 0x0) 21:00:39 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:39 executing program 4: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) 21:00:39 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x1c2, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000003080)={&(0x7f0000000640)=@generic={0xa, "af3f964605e75d78679bbf39d5fbc415aa2612089f61f08ef8264d6d37e6504664e5eaecc0f9bd17c74c550a46b052a7763505e4b803404bfeda135f29a721adc249191f5cafc024e116f16ec2d6c3fdee89c4e981799ac0335badab461ae75cb8e3da3d3b214f97ed9f5ee1c951875d19b9782df26780ccb854c7ed49c0"}, 0x80, &(0x7f0000001bc0), 0x0, &(0x7f0000001c40)}, 0x41) 21:00:39 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x94, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:39 executing program 4: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) [ 1355.290733] netlink: 'syz-executor2': attribute type 4 has an invalid length. [ 1355.310040] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1355.323155] netlink: 17 bytes leftover after parsing attributes in process `syz-executor2'. 21:00:39 executing program 4: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) 21:00:39 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000000000000000600"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1355.334916] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1355.350463] netlink: 'syz-executor2': attribute type 4 has an invalid length. [ 1355.365543] netlink: 17 bytes leftover after parsing attributes in process `syz-executor2'. 21:00:39 executing program 2: socket$inet6(0xa, 0x0, 0x400) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001700)) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, &(0x7f0000000080), 0x1c) shutdown(r1, 0x1) [ 1355.462875] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) [ 1355.513200] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:39 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000500"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:39 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@loopback, @in=@broadcast}, {0x1}, {}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@mcast1}, 0x0, @in=@multicast1, 0x0, 0x0, 0x3, 0x0, 0x800, 0x0, 0x100}}, 0xe8) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040), 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x80000000000040, &(0x7f0000000080), 0x5c206f9640e7a35d) 21:00:39 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) 21:00:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) [ 1355.728213] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1355.757761] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:40 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x148, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000feffff0700"}, {}, {0x0, '\x00', 0x1}]}, 0x108) 21:00:40 executing program 2: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() chroot(&(0x7f0000000040)='./file0\x00') sched_setscheduler(r0, 0x5, &(0x7f0000000000)) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x450802, 0x150) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) setresuid(0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000180)) 21:00:40 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) 21:00:40 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) getpeername(r0, &(0x7f0000000700)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000780)=0x80) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004940), &(0x7f0000004980)=0xc) lstat(&(0x7f00000049c0)='./file0\x00', &(0x7f0000004a00)) 21:00:40 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004400)=[{{&(0x7f0000001400)=@llc, 0x80, &(0x7f0000002800), 0x0, &(0x7f0000002880)=""/12, 0xc}}], 0x1, 0x0, &(0x7f00000045c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x73, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:40 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000040)) [ 1356.089902] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1356.095760] kasan: CONFIG_KASAN_INLINE enabled 21:00:40 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) [ 1356.138896] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1356.147249] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1356.169739] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1356.176018] CPU: 0 PID: 10394 Comm: syz-executor2 Not tainted 4.19.0-rc4-next-20180920+ #76 [ 1356.184519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1356.193906] RIP: 0010:reconfigure_super+0x48e/0xbb0 [ 1356.198939] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 62 05 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 03 48 8d 78 30 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 4d 05 00 00 48 8b 40 30 48 85 c0 48 89 85 20 ff [ 1356.217854] RSP: 0018:ffff8801953078d8 EFLAGS: 00010206 [ 1356.223319] RAX: 0000000000000000 RBX: ffff8801953079f8 RCX: 0000000000000006 [ 1356.230599] RDX: dffffc0000000000 RSI: ffffffff81cdb95b RDI: 0000000000000030 [ 1356.237880] RBP: ffff8801953079c8 R08: ffff880162ce24c0 R09: fffffbfff12c24e5 [ 1356.245164] R10: fffffbfff12c24e5 R11: ffffffff8961272b R12: ffff8801c6970580 [ 1356.252466] R13: 1ffff10032a60f20 R14: 0000000000000000 R15: ffff880195307adc [ 1356.259742] FS: 00007fe532699700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 1356.267971] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1356.273855] CR2: 0000001b30d22000 CR3: 00000001c9ce5000 CR4: 00000000001406f0 [ 1356.281142] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1356.288430] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1356.295702] Call Trace: [ 1356.298307] ? user_get_super+0x250/0x250 [ 1356.302470] ? down_write+0x8a/0x130 [ 1356.306189] ? do_umount_root+0x218/0x320 [ 1356.310536] ? down_read+0x120/0x120 [ 1356.314260] do_umount_root+0x2b1/0x320 [ 1356.318274] ? namespace_unlock+0x210/0x210 [ 1356.322604] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1356.328182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1356.333736] ? ns_capable_common+0x13f/0x170 [ 1356.338170] ksys_umount+0x8b6/0x1230 [ 1356.341985] ? check_preemption_disabled+0x48/0x200 [ 1356.347034] ? __detach_mounts+0x430/0x430 [ 1356.351282] ? find_held_lock+0x36/0x1c0 [ 1356.355399] ? do_sched_setscheduler+0xf4/0x1f0 [ 1356.360083] ? lock_downgrade+0x900/0x900 [ 1356.364248] ? check_preemption_disabled+0x48/0x200 [ 1356.369284] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1356.374219] ? kasan_check_read+0x11/0x20 [ 1356.378379] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1356.383670] ? __sched_setscheduler+0x2150/0x2150 [ 1356.388522] ? __x64_sys_futex+0x47f/0x6a0 [ 1356.392765] ? do_syscall_64+0x9a/0x820 [ 1356.396746] ? do_syscall_64+0x9a/0x820 [ 1356.400726] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1356.405316] ? trace_hardirqs_on+0xbd/0x310 [ 1356.409654] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1356.415030] ? trace_hardirqs_off_caller+0x300/0x300 [ 1356.420177] __x64_sys_umount+0x54/0x80 [ 1356.424169] do_syscall_64+0x1b9/0x820 [ 1356.428070] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1356.433451] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1356.438402] ? trace_hardirqs_off+0x310/0x310 [ 1356.442915] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1356.447951] ? recalc_sigpending_tsk+0x180/0x180 [ 1356.452720] ? kasan_check_write+0x14/0x20 [ 1356.456974] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1356.461842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1356.467048] RIP: 0033:0x457679 [ 1356.470263] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:00:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "0000000000000000000000000000000000000000000200"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1356.489197] RSP: 002b:00007fe532698c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1356.497012] RAX: ffffffffffffffda RBX: 00007fe5326996d4 RCX: 0000000000457679 [ 1356.504310] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200002c0 [ 1356.511614] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1356.518896] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1356.526187] R13: 00000000004d81a8 R14: 00000000004c4f0c R15: 0000000000000000 [ 1356.533467] Modules linked in: [ 1356.560906] kobject: 'loop1' (00000000f0a68452): kobject_uevent_env [ 1356.573227] kobject: 'loop1' (00000000f0a68452): fill_kobj_path: path = '/devices/virtual/block/loop1' 21:00:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, "000000000000000000000000000000000000000000000000000000000400"}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1356.603641] kernel msg: ebtables bug: please report to author: No valid hooks specified 21:00:40 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) [ 1356.666208] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1356.720254] kobject: 'loop4' (00000000aafc763b): kobject_uevent_env [ 1356.726717] kobject: 'loop4' (00000000aafc763b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1356.749260] ---[ end trace 8b1e6d2afe6507aa ]--- [ 1356.754135] RIP: 0010:reconfigure_super+0x48e/0xbb0 21:00:41 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x1, 0x90, [], 0x0, &(0x7f0000000100), &(0x7f0000000200)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1356.778100] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 62 05 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 03 48 8d 78 30 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 4d 05 00 00 48 8b 40 30 48 85 c0 48 89 85 20 ff [ 1356.817361] kobject: 'loop1' (00000000f0a68452): kobject_uevent_env [ 1356.824379] kobject: 'loop1' (00000000f0a68452): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1356.855517] RSP: 0018:ffff8801953078d8 EFLAGS: 00010206 [ 1356.865866] kernel msg: ebtables bug: please report to author: No valid hooks specified [ 1356.866090] kobject: 'loop4' (00000000aafc763b): kobject_uevent_env [ 1356.880691] RAX: 0000000000000000 RBX: ffff8801953079f8 RCX: 0000000000000006 [ 1356.902372] RDX: dffffc0000000000 RSI: ffffffff81cdb95b RDI: 0000000000000030 21:00:41 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x9c, &(0x7f00000011c0)}}], 0x249, 0x0) 21:00:41 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xfffffffffbffffff, 0x4) [ 1356.920001] kobject: 'loop4' (00000000aafc763b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1356.921557] RBP: ffff8801953079c8 R08: ffff880162ce24c0 R09: fffffbfff12c24e5 [ 1356.931250] kasan: CONFIG_KASAN_INLINE enabled [ 1356.946232] R10: fffffbfff12c24e5 R11: ffffffff8961272b R12: ffff8801c6970580 [ 1356.956926] kobject: 'loop1' (00000000f0a68452): kobject_uevent_env [ 1356.965598] kobject: 'loop1' (00000000f0a68452): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1356.972389] R13: 1ffff10032a60f20 R14: 0000000000000000 R15: ffff880195307adc [ 1356.984704] kobject: 'loop3' (000000007e2ac51f): kobject_uevent_env [ 1356.991449] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1356.998035] FS: 00007fe532699700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 1357.008636] kobject: 'loop3' (000000007e2ac51f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1357.020673] kobject: 'loop4' (00000000aafc763b): kobject_uevent_env [ 1357.027135] kobject: 'loop4' (00000000aafc763b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1357.029572] general protection fault: 0000 [#2] PREEMPT SMP KASAN [ 1357.042833] CPU: 1 PID: 10399 Comm: syz-executor2 Tainted: G D 4.19.0-rc4-next-20180920+ #76 [ 1357.043964] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1357.052712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1357.052734] RIP: 0010:reconfigure_super+0x48e/0xbb0 [ 1357.052748] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 62 05 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 03 48 8d 78 30 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 4d 05 00 00 48 8b 40 30 48 85 c0 48 89 85 20 ff [ 1357.052755] RSP: 0018:ffff880198c778d8 EFLAGS: 00010206 [ 1357.052766] RAX: 0000000000000000 RBX: ffff880198c779f8 RCX: 0000000000000006 [ 1357.052774] RDX: dffffc0000000000 RSI: ffffffff81cdb95b RDI: 0000000000000030 [ 1357.052782] RBP: ffff880198c779c8 R08: ffff88019c826280 R09: fffffbfff12c24e5 [ 1357.052790] R10: fffffbfff12c24e5 R11: ffffffff8961272b R12: ffff8801bc8a0480 [ 1357.052805] R13: 1ffff1003318ef20 R14: 0000000000000000 R15: ffff880198c77adc [ 1357.069233] CR2: 00000000004cc520 CR3: 00000001c9ce5000 CR4: 00000000001406f0 [ 1357.073051] FS: 00007fe532699700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 1357.073061] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1357.073069] CR2: 0000000000625208 CR3: 00000001c9ce5000 CR4: 00000000001406e0 [ 1357.073083] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1357.102748] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1357.104638] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1357.104644] Call Trace: [ 1357.104668] ? user_get_super+0x250/0x250 [ 1357.104687] ? down_write+0x8a/0x130 [ 1357.112492] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1357.119221] ? do_umount_root+0x218/0x320 [ 1357.119236] ? down_read+0x120/0x120 [ 1357.119253] do_umount_root+0x2b1/0x320 [ 1357.119266] ? namespace_unlock+0x210/0x210 [ 1357.119287] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1357.127055] Kernel panic - not syncing: Fatal exception [ 1357.134717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1357.235415] ? ns_capable_common+0x13f/0x170 [ 1357.239826] ksys_umount+0x8b6/0x1230 [ 1357.243627] ? dput.part.25+0x241/0x790 [ 1357.247605] ? __detach_mounts+0x430/0x430 [ 1357.251840] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1357.256423] ? mnt_get_count+0x150/0x150 [ 1357.260489] ? dput.part.25+0x26d/0x790 [ 1357.264463] ? shrink_dcache_sb+0x350/0x350 [ 1357.268785] ? current_umask+0x70/0x70 [ 1357.272691] ? __x64_sys_futex+0x47f/0x6a0 [ 1357.276929] ? trace_hardirqs_on+0xbd/0x310 [ 1357.281252] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1357.286618] ? trace_hardirqs_off_caller+0x300/0x300 [ 1357.291727] __x64_sys_umount+0x54/0x80 [ 1357.295706] do_syscall_64+0x1b9/0x820 [ 1357.299594] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1357.304982] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1357.309919] ? trace_hardirqs_off+0x310/0x310 [ 1357.314416] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1357.319525] ? recalc_sigpending_tsk+0x180/0x180 [ 1357.324286] ? kasan_check_write+0x14/0x20 [ 1357.328536] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1357.333390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1357.338583] RIP: 0033:0x457679 [ 1357.341776] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1357.360681] RSP: 002b:00007fe532698c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1357.368396] RAX: ffffffffffffffda RBX: 00007fe5326996d4 RCX: 0000000000457679 [ 1357.375662] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200002c0 [ 1357.382938] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1357.390204] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1357.397475] R13: 00000000004d81a8 R14: 00000000004c4f0c R15: 0000000000000000 [ 1357.404755] Modules linked in: [ 1357.409146] Kernel Offset: disabled [ 1357.412775] Rebooting in 86400 seconds..