000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x200116c0}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:28 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x04\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:28 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2550.071881][T15169] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2550.101628][T15165] IPVS: Scheduler module ip_vs_ú” not found [ 2550.241137][T15181] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2550.333712][T15184] IPVS: Scheduler module ip_vs_ú” not found 22:56:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff000002f9}, 0x28) 22:56:29 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x05\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:29 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x2, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:29 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:29 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x3f000000}}}], 0xffffff76) [ 2550.709380][T15194] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:29 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x06\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2550.790078][T15195] IPVS: Scheduler module ip_vs_ú” not found 22:56:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff000002fa}, 0x28) 22:56:29 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x8, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2550.940318][T15217] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:29 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\a\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff000002fb}, 0x28) [ 2551.065155][T15221] IPVS: Scheduler module ip_vs_ú” not found 22:56:29 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x600, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2551.158680][T15232] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff000002fc}, 0x28) 22:56:29 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x11\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2551.363268][T15246] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2551.407616][T15240] IPVS: Scheduler module ip_vs_ú” not found 22:56:30 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xdc}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:30 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00H\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff000002fd}, 0x28) 22:56:30 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:30 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0xfeffffff}}}], 0xffffff76) 22:56:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2551.679893][T15267] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:30 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xdc00}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff000002fe}, 0x28) [ 2551.723282][T15272] IPVS: Scheduler module ip_vs_ú” not found 22:56:30 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00L\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x0, 0x0}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2551.909617][T15293] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff000002ff}, 0x28) 22:56:30 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00`\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x0, 0x0}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2552.033897][T15295] IPVS: Scheduler module ip_vs_ú” not found 22:56:30 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xdc0000}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2552.156040][T15312] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2552.306653][T15315] IPVS: Scheduler module ip_vs_ú” not found 22:56:31 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000300}, 0x28) 22:56:31 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xdc000000000000}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:31 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00h\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x0, 0x0}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:31 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0xfffffffe}}}], 0xffffff76) [ 2552.714692][T15328] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:31 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00l\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2552.781350][T15335] IPVS: Scheduler module ip_vs_ú” not found 22:56:31 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x0}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000301}, 0x28) 22:56:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x0, &(0x7f00006dc000)}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2552.957476][T15354] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:31 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x0}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:31 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00t\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2553.036396][T15356] IPVS: Scheduler module ip_vs_ú” not found [ 2553.155210][T15368] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2553.350479][T15372] IPVS: Scheduler module ip_vs_ú” not found 22:56:32 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000302}, 0x28) 22:56:32 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00z\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x0, &(0x7f00006dc000)}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:32 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x800800000000}}}], 0xffffff76) 22:56:32 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x0}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2553.628936][T15388] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2553.678393][T15387] IPVS: Scheduler module ip_vs_ú” not found 22:56:32 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x88\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:32 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x0}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000303}, 0x28) 22:56:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x0, &(0x7f00006dc000)}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2553.810695][T15404] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:32 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x03\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000304}, 0x28) [ 2553.949259][T15410] IPVS: Scheduler module ip_vs_ú” not found [ 2554.032959][T15421] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:33 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:33 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x4) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:33 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x05\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000305}, 0x28) 22:56:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:33 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x7ffffffffffff}}}], 0xffffff76) [ 2554.666362][T15440] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:33 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x6) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2554.711138][T15442] IPVS: Scheduler module ip_vs_ú” not found 22:56:33 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x06\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000306}, 0x28) 22:56:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2554.917298][T15465] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2554.932672][T15460] IPVS: Scheduler module ip_vs_ú” not found 22:56:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000307}, 0x28) 22:56:33 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) sendmsg$nl_route(r1, &(0x7f0000000900)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x21008}, 0xc, &(0x7f0000000880)={&(0x7f0000000940)=ANY=[@ANYBLOB="6c0000001800000428bd7000fbdbdf2502003008ff00000f00310000080005000000003cdbd8ba97f8129309", @ANYRES32=r2, @ANYBLOB="08000700ffffffff080015000700000008001900", @ANYRES32=r3, @ANYBLOB="100016000c00500008000000ebef78eb552cd534cff6be34270f16b0f996ca1381bc5c2f0c799a0a1445174c6952263b99", @ANYRES32=r4, @ANYBLOB="0c00090000000001", @ANYRES32=r5], 0x6c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4080) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) truncate(0x0, 0x200) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r8, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r8, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r8, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r8, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r8, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x1d, r2}, 0x10, &(0x7f0000000a00)={&(0x7f0000000800)=@canfd={{0x2, 0x1a20, 0x8c, 0x7ff}, 0x2, 0x3, 0x0, 0x0, "14be7df68994155b9fae8ade2805dda2bcf42b1f089019d13e8dd83e04600170e0c0899ef7a90a5aa14b09fbca5b282b46dfecdcf5288f2a217c38626bebf229"}, 0x48}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r9 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r9, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2555.185784][T15477] IPVS: Scheduler module ip_vs_ú” not found 22:56:34 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:34 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\a\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000308}, 0x28) 22:56:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:34 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r1, 0x0, 0x3, &(0x7f00000003c0)='ah\x00'}, 0x30) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000480)=0x0) kcmp(r5, r6, 0x7, r0, r2) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r7, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r7, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r7, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r7, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r8 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r8, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:34 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x10000000000000}}}], 0xffffff76) [ 2555.760370][T15501] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2555.792658][T15495] IPVS: Scheduler module ip_vs_ú” not found 22:56:34 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0x0, {0x0, 0x1c9c380}, 0x9, 0x7ffffffe}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000309}, 0x28) 22:56:34 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x11\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2556.013657][T15517] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000030a}, 0x28) 22:56:34 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00 \x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2556.085486][T15515] IPVS: Scheduler module ip_vs_ú” not found [ 2556.252842][T15534] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:35 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:35 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000280)={0x402, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x100000820, 0x6, 0x0, 0x2, 0x3}) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) syz_open_dev$radio(&(0x7f00000003c0)='/dev/radio#\x00', 0x3, 0x2) r4 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0xc0505405, &(0x7f0000000000)={{0x100000001, 0x0, 0x0, 0x3, 0xfffffffffffffffd}}) 22:56:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:35 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x100000000000000}}}], 0xffffff76) 22:56:35 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00?\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000030b}, 0x28) [ 2556.716775][T15550] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000030c}, 0x28) 22:56:35 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00H\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2556.786551][T15553] IPVS: Scheduler module ip_vs_ú” not found 22:56:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2556.925712][T15568] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:35 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00L\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000030d}, 0x28) 22:56:35 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$reiserfs(&(0x7f00000003c0)='reiserfs\x00', &(0x7f0000000400)='./file0\x00', 0x3, 0x7, &(0x7f0000000c00)=[{&(0x7f0000000480)="4f690428be6a06c6480e1275ca44fd7a589769dfdc18e201b7c4d3cac7ee4f4854009f089f4b32a88d21bb28007fb09826a9f1db541a6a81b6a1ee497e65ba8ce1a43494859c8e273c5e44cd768af162ad99940c5d22185e74ffdf4c22047197262891f484cf9093ebb41eb0573b7e37df385b5853466ab6a4473eff2b57dac18f28fa364e7a143b1ea78616d04170e6ad26c48bbefb2da4f0327879430a2b9e5f9e13bf2713771afe35672b5ccab357d8c9112a4ffda88145e71bf46730f53d53d3", 0xc2, 0x9}, {&(0x7f0000000580)="4913c39d0e817d9aea7dff382d10f06f7934470f1c2904acec3575679cfe7887f7eb50e21361ba33590d6f8ad623c330edde4f09832ce84446a221feb4c61c3511929c0098c359d7ab09b2b29d930ca3ebca06a0ea4d8d9429d6f6b71a1c420227a5935366e6f953aea2ea129a168dd1b8679a15dd74d92750cb6e13b6865673df646e158704db907d8e82ee6f9654ff497f938e3d476ed911ea94308e1d11b0f07473b59234cc37c13954b44d75f85a5f48f4e181b4e12e08ac6fd9e9690a77a3f53ecadea58cd0fd415bb425d7c85507831364db45d912f7d31a5087cc8751601a", 0xe2, 0x4}, {&(0x7f0000000680)="0aa3ebef4d8900f53360ba30474f1c5682328d06a1f39e48dfca534837cdc3f2220afd786eb6c2b2f348eb98cd2f55d07ca3f7e138fb46544a1c00de8509e34404323b88046acb30018fc8a0770126c2ecaee7f4cfa1e9a7f17982395d65e6bb75ca7eadbb5a93db7998252fc6763d2a5a673bc0ed9305bb0760c96bc9ff4a59f4e99ef288bcc06d7e4104b8d9ff9c517f6d6f08735208dfdf8c0146b33947b8a9b1eba6a3dcd4516207", 0xaa, 0xffffffff}, {&(0x7f0000000900)="f535df6211be4ad78bb89f0642f0c6ad128fd5d684ba3c6105da88cdd7c9d89fe6f6021a158849739119da8b20e3008a446a1fac65ed74a3846a87300591c6f8424c14269ad5f99d553ef273a703313c68e5408631ac3d3c319fcfb6619f8f737c83393e1fa68b9c3967268777aed678f8bc463add480b222e0ac6f5be28708411b38d5e49c9c3895c7e7b561a5b3b9e2486292dbfcd8e272b7ce5a8f6032b46b3a2029f325b5d597bf850cb37ed3bac90751489049b58a97776b038ee46ea11373d9da3a69e17a7a6ac6161ba2a93954cb05d0c3902167df36f75eb7fce5c869d6a0fb4acbe615565720c58", 0xec, 0x1}, {&(0x7f0000000800)="40e62fe8102d2ef87feadaa865b2c2d9ed67ee629f6c3221ff4d4857ea7f01d9ca2d175e3524194cc8dc39a7e1c95592fd7b180da247fe2e3770c1dc73b574c7bb82b09d26e86b402b568ef7b6109adeff10d302fba75ffa04be8780368e964c5da62d6336e5c418035d3c34bf5a7a9531fba462cf70fed690efb653dce874dd998613870c501b962f33e788c0e10334e92f1b12e9c8badbc43719dd955cda0894e15c2d", 0xa4, 0x7fffffff}, {&(0x7f0000000a00)="6aacd78948f78d96d0b84c90b39aee1b943ca3f8d393168da1cb15a64e697b424e83145c68cfeea1e0453aa35af944627fed004f97ef89af74d50231dd5d2175ce47f7b1575502f402fd53baefb20ae48a073640b53b8602cd6698cf4559a8fe1334b64b325fb1226e9215b3f5b45856200d56b46700139265e2704c5ab58318d8120694d18de1caff2364a5bdc5d89a698616007bbd1cc57b479b80b6de31e4e6087ca79a0eb1e4da21b2f9d5077a9d5aed6e3061187cdc45fca490aa0b74756b6d", 0xc2, 0x2}, {&(0x7f0000000b00)="84ca5bf424e9474f30501aeb370567aaf9ccad5ac8553ad2eb8ef321d08719252aa6b6133471cc2a01af99d7a4be965350ebe056fd1120e27001a36adbfa82dec2a838755b7115a7ab3208368533be36a06eae2f420d6a9fcd7bc39f5e2f50f5c8528d5524e273ff94bdf1a474f21caba63af8cccb7e56160d4c49185b79e52eef2c1c8d19fc46fbf775b67fe57c2d70e8a54abd1bf9bd878da7689b129501fa1d31d0bd8006387428bdbae68a0929991fcb03fae0c58f94beb1fd527ea7ba3fc7442a76ed4bd0c8351f4097e70ad53a740fe473194b7504783ac2bedd12813888a04641c022c4b18a4963d6831f", 0xee, 0x100000000}], 0x400, &(0x7f0000000cc0)={[{@jdev={'jdev', 0x3d, './file0'}}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@appraise='appraise'}, {@context={'context', 0x3d, 'root'}}, {@dont_measure='dont_measure'}]}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x2ff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) [ 2557.216369][T15577] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:36 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:36 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00`\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000030e}, 0x28) 22:56:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:36 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r1, 0x0, 0x3, &(0x7f00000003c0)='@)\x00', 0xffffffffffffffff}, 0x30) ptrace$setregset(0x4205, r2, 0x202, &(0x7f0000000500)={&(0x7f0000000480)="0bea82660900c06dd9a066f64e55aa68d634a0b72ecea7d1cd11e046f6c60675aa1acc8f3ddd2eac9854a4bd0d315e64821ff6df7d6702d7266a7f6b8bf88674dee4c47633", 0x45}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r6, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r6, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r6, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r7 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r7, 0xc0505405, &(0x7f0000000000)={{0x100000001, 0x0, 0x0, 0x3}}) 22:56:36 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x200000000000000}}}], 0xffffff76) [ 2557.818230][T15595] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:36 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00h\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000030f}, 0x28) [ 2557.956371][T15604] IPVS: Scheduler module ip_vs_ú” not found 22:56:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2558.038060][T15619] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:36 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000003c0)={0x0, @aes128, 0x2, "7afcb2a037cd10c4"}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1e, &(0x7f00000004c0)=0x51b0, 0x2c7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:36 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00l\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000310}, 0x28) [ 2558.306872][T15627] IPVS: Scheduler module ip_vs_ú” not found [ 2558.375721][T15640] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:37 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:37 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'\x04-;\x12%w^\xbb\x00\x00\x00\x00\x00\x04\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) fstat(r5, &(0x7f00000003c0)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000311}, 0x28) 22:56:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:37 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00t\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:37 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x300000000000000}}}], 0xffffff76) [ 2558.942374][T15657] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000312}, 0x28) [ 2559.004584][T15659] IPVS: Scheduler module ip_vs_ú” not found 22:56:37 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0xb, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000300)={0xffffffffffffffff, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f00000003c0)=0x7, 0x4) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000480)=""/189) 22:56:37 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00z\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000313}, 0x28) [ 2559.195305][T15677] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2559.262129][T15675] IPVS: Scheduler module ip_vs_ú” not found 22:56:37 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x88\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2559.414338][T15695] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:38 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:38 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) r5 = shmget(0x0, 0x4000, 0x10, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_STAT(r5, 0xd, &(0x7f00000003c0)=""/78) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:38 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x01\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000314}, 0x28) 22:56:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:38 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x600000000000000}}}], 0xffffff76) [ 2559.875583][T15710] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000315}, 0x28) [ 2559.938427][T15701] IPVS: Scheduler module ip_vs_ú” not found 22:56:38 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x02\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:38 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f00000003c0)={0x5, "ee25d92c0395ff1f9d19a41cabc2e87979299a7cf1d890a9cc8ef07b955852ca", 0x1, 0x1}) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000400)={0x8001, "6324a354029347dafd1aa11565a522335eb622bb06ccb13fac3d2c807617bc68", 0x3, 0x1}) r3 = socket$inet(0x2, 0x4000000000000001, 0x8000) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x200000000001, 0x4001) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000580), 0x10, &(0x7f0000000500)={&(0x7f00000004c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x10}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2560.153484][T15728] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000316}, 0x28) 22:56:38 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x03\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2560.359611][T15742] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:39 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:39 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x04\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, 0x0) 22:56:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000317}, 0x28) 22:56:39 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) connect$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:39 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x800000000000000}}}], 0xffffff76) [ 2561.025638][T15762] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000318}, 0x28) [ 2561.083775][T15760] IPVS: Scheduler module ip_vs_ú” not found 22:56:39 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000003c0)={0x10001, 0x0, 0xfffffffffffeffff, 0x1, 0x6, 0x10001, 0x100, 0x3f, 0x8, 0x80, 0x5}, 0xb) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:39 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x05\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, 0x0) 22:56:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000319}, 0x28) [ 2561.302064][T15784] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2561.340905][T15780] IPVS: Scheduler module ip_vs_ú” not found 22:56:40 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x06\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2561.592577][T15800] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:40 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:40 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x19c904518e36e162) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x8000010800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000005, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x802, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000540)={0x3a, @local, 0x4e21, 0x1, '\xfc\xff\t\x00\x00\x00\x02\x00\x00\x81\x00', 0x2, 0x4004, 0x31}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000400)={{0x1, 0x1, 0x1, 0x0, 0x2}}) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0xfffffffffffffffc, 0x401, 0x1, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f00000004c0)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000000480)=ANY=[@ANYRES64], 0x8) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000031a}, 0x28) 22:56:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, 0x0) 22:56:40 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\a\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:40 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0xc00000000000000}}}], 0xffffff76) [ 2562.120681][T15811] IPVS: set_ctl: invalid protocol: 58 172.20.20.170:20001 [ 2562.138450][T15815] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000031b}, 0x28) 22:56:40 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\xfe\xff\xff\a\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x0, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2562.433406][T15831] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000031c}, 0x28) 22:56:41 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(r1, &(0x7f00000003c0)='./file0\x00', 0x14000, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) r5 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$describe(0x6, r5, &(0x7f00000004c0)=""/65, 0x41) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) 22:56:41 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x11\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2562.679241][T15847] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2562.714863][T15842] IPVS: Scheduler module ip_vs_ú” not found 22:56:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000031d}, 0x28) 22:56:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x0, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:41 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00 \x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:41 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:41 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x1000000000000000}}}], 0xffffff76) [ 2563.038294][T15858] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:41 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = getgid() lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000400)=[0xffffffffffffffff, 0xee00, 0xee00, 0x0, 0xee01, 0x0, 0xffffffffffffffff]) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x6, &(0x7f0000000700)=[r4, r5, r6, r7, r8, r9]) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r10, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000880)=0x1, 0x1d7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r10, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r10, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r11 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r11, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:41 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00?\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000031e}, 0x28) 22:56:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x0, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2563.297092][T15881] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2563.327629][T15872] IPVS: Scheduler module ip_vs_ú” not found 22:56:42 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) fcntl$getownex(r3, 0x10, &(0x7f00000003c0)) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000031f}, 0x28) 22:56:42 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00H\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x0, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2563.528557][T15899] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2563.540231][T15892] IPVS: Scheduler module ip_vs_ú” not found 22:56:42 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00L\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:42 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2563.639106][T15907] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2563.730812][T15907] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2563.803336][T15915] IPVS: Scheduler module ip_vs_ú” not found 22:56:42 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000320}, 0x28) 22:56:42 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00`\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x0, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:42 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000004c0)={0x6, &(0x7f0000000480)=[{}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000005c0)={r3, &(0x7f0000000500)=""/168}) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f00000003c0)) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r5, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r5, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:42 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x3f00000000000000}}}], 0xffffff76) [ 2564.144847][T15926] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:42 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00h\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2564.261540][T15934] IPVS: Scheduler module ip_vs_ú” not found 22:56:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000321}, 0x28) 22:56:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x0, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:43 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000480), &(0x7f00000004c0)=0x4) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000003c0), &(0x7f0000000400)=0x4) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2564.429997][T15949] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:43 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00l\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000322}, 0x28) [ 2564.591859][T15957] IPVS: Scheduler module ip_vs_ú” not found [ 2564.676833][T15966] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:43 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:43 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000900)=""/4096, &(0x7f00000003c0)=0x1000) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) getsockopt$inet6_dccp_buf(r5, 0x21, 0xcd, &(0x7f0000000480)=""/226, &(0x7f0000000400)=0xe2) 22:56:43 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00t\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000323}, 0x28) 22:56:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x0, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:43 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x7fffffffffffffff}}}], 0xffffff76) [ 2565.184963][T15984] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000324}, 0x28) 22:56:43 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00z\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2565.250397][T15985] IPVS: Scheduler module ip_vs_ú” not found 22:56:44 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) sendto$inet(r3, &(0x7f00000003c0)="770796d46e09d6a6f8f06410eda861e221eee322a75b2b66a3555d30afe53c157ba40ebc2263edc4", 0x28, 0x40000, 0x0, 0x0) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0505405, &(0x7f0000000000)={{0x100000001, 0x0, 0x0, 0x3}}) [ 2565.393550][T16002] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x0, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000325}, 0x28) 22:56:44 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x88\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2565.563200][T16008] IPVS: Scheduler module ip_vs_ú” not found [ 2565.640526][T16020] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:44 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:44 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) openat$cuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/cuse\x00', 0x2, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:44 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\a\xff\xff\xfe\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000326}, 0x28) 22:56:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x0, 0x12083a1b, 0x1, 0xd1fe}}) 22:56:44 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x8000000000000000}}}], 0xffffff76) [ 2566.122846][T16039] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2566.126590][T16031] IPVS: Scheduler module ip_vs_ú” not found 22:56:44 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) lgetxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000540)=""/187, 0xbb) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00', 0x19, 0x4, 0xd70, [0x20000900, 0x0, 0x0, 0x20000a48, 0x20000b68], 0x0, &(0x7f00000003c0), &(0x7f0000000900)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0xb, 0x1, 0x201, 'nr0\x00', 'bridge_slave_1\x00', 'sit0\x00', 'eql\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0xe0, 0x118}, [@snat={'snat\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}, @snat={'snat\x00', 0x10, {{@empty, 0x10}}}]}, @snat={'snat\x00', 0x10, {{@empty, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x9, 0x2, 0x88f8, 'syzkaller1\x00', 'bcsf0\x00', 'erspan0\x00', 'hwsim0\x00', @random="4a026f1f32ed", [0xe784c369ba38777f, 0xff, 0xff, 0x0, 0x0, 0xff], @dev={[], 0x24}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xb8, 0xb8, 0xf0, [@limit={'limit\x00', 0x20, {{0x7, 0x1, 0x3, 0x2, 0x4, 0x800}}}]}}, @snat={'snat\x00', 0x10, {{@remote}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x1, 0xa15, 'veth0_to_bridge\x00', 'tunl0\x00', 'veth0_to_team\x00', 'bcsf0\x00', @empty, [0x0, 0xff, 0xff, 0x0, 0xff], @remote, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], 0x898, 0x8d0, 0x908, [@u32={'u32\x00', 0x7c0, {{[{[{0x3a, 0x3}, {0x3f, 0x2}, {0x0, 0x2}, {0x401, 0x1}, {0x1, 0x1}, {0x9, 0x3}, {0x8, 0x2}, {0x7, 0x3}, {0x8001, 0x3}, {0x4, 0x3}, {0x2, 0x2}], [{0x8001, 0x7}, {0x0, 0x3}, {0x7, 0x2}, {0x7, 0x6}, {0x9, 0xfffffffffffffffa}, {0x8000, 0x1000}, {0x7, 0x20000000000000}, {0x7, 0x5ce}, {0x40}, {0x1ff, 0x8}, {0x9, 0x7}], 0x7, 0x9}, {[{0xffffffff, 0x3}, {0x1000, 0x1}, {0x8a5, 0x3}, {0x3417}, {0x1000, 0x3}, {0x9, 0x3}, {0x1}, {0x8, 0x3}, {0x100000000, 0x3}, {0x81, 0x3}, {0xfffffffffffffcb0, 0x1}], [{0x9, 0x3}, {0x4ee3, 0x10001}, {0xdc, 0x9}, {0x9, 0x1}, {0x20, 0x9}, {0x1, 0x7f}, {0x80, 0x3}, {0x401, 0x1f}, {0x2, 0x9}, {0x3, 0x9}, {0x1, 0x7}], 0x5, 0x3}, {[{0x5, 0x3}, {0x9, 0x2}, {0xcd}, {0x15, 0x3}, {0x7, 0x1}, {0x4, 0x2}, {0x7, 0x3}, {0x6}, {0x8}, {0x3, 0x3}, {0x20}], [{0x9, 0x1ff}, {0x20, 0x7fff}, {0x4, 0x7aa23466}, {0xffff, 0x7ff}, {0x7, 0x4}, {0x7c9, 0x100000000}, {0x1, 0x6}, {0x4, 0x7}, {0x2000000000000, 0xffffffffffffff00}, {0x2, 0x401}, {0x5, 0x626}], 0x6, 0x4}, {[{0x5, 0x2}, {0x1, 0x2}, {0x2}, {0x5, 0x2}, {0x5, 0x3}, {0x0, 0x3}, {0x7, 0x1}, {0xf21, 0x3}, {0xffffffffffffff7f, 0x2}, {0x100}, {0xfb, 0x1}], [{0x7f, 0x200}, {0x10000, 0x6}, {0x5, 0x4}, {0x9, 0x7ff}, {0x8001, 0x7fffffff}, {0xfffffffffffffff8, 0xa7fd}, {0x2, 0x80}, {0x0, 0x3}, {0x0, 0x2}, {0x7aee, 0xfffffffffffffff8}, {0x8, 0x101}], 0xb, 0x8}, {[{0x0, 0x3}, {0x0, 0x1}, {0xffff, 0x1}, {0xb58, 0x2}, {0x9, 0x2}, {0x46, 0x1}, {0x8, 0x3}, {0x8, 0x1}, {0x0, 0x1}, {0xbee8, 0x3}, {0x1, 0x1}], [{0x8, 0x8}, {0x2, 0x101}, {0xb1, 0x1f}, {0x7, 0x2}, {0x3f, 0x9}, {0x0, 0x4}, {0x1, 0x10001}, {0x5, 0x1}, {0x9, 0x7}, {0x8e3, 0x4}, {0x80000001, 0x447}], 0x5, 0xa}, {[{0x20000000000, 0x3}, {0x400, 0x3}, {0x5, 0x2}, {0x1, 0x3}, {0x200}, {0x9, 0x3}, {0x1}, {0x0, 0x1}, {0x1000000, 0x3}, {0x8, 0x3}, {0x6bda}], [{0x4, 0x9}, {0xffff, 0x1000}, {0x80000000, 0xfcf}, {0x5, 0x3}, {0x3, 0xfffffffffffff8f1}, {0x9, 0x2}, {0xba5, 0x4041}, {0x3ff, 0x10000}, {0x7fe, 0x4}, {0xad5, 0xe5}, {0x93, 0x4c}], 0x2}, {[{0x2022}, {0x10001}, {0x0, 0x1}, {0x7f}, {0x8}, {0xffffffffffffff1c, 0x3}, {0x3, 0x2}, {0x6}, {0x2, 0x3}, {0x3, 0x6cf1cd4a4c2b1733}, {0x4, 0x3}], [{0x5, 0x80}, {0x8000, 0x1}, {0x2, 0x85}, {0x3ff, 0x6}, {0x4, 0x9}, {0x4, 0x1}, {0x80000001, 0x9}, {0x16, 0x101}, {0xf414, 0x7f}, {0x6}, {0xfff}], 0xa, 0x4}, {[{0x5, 0x1}, {0x0, 0x2}, {0x2b37, 0x1}, {0x20, 0x2}, {0xf12, 0x3}, {0x933, 0x3}, {0x1, 0x2}, {0x2be, 0x3}, {0x2, 0x1}, {0x5, 0x2}, {0x7, 0x2}], [{0x7, 0x7}, {0x6, 0x8000}, {0x7, 0x5}, {0x930e, 0x7}, {0x1000, 0x7}, {0x2, 0x1}, {0x0, 0x5}, {0x9, 0x7fff}, {0x4, 0x7}, {0x200, 0x60000000000}, {0x8000}], 0x0, 0x5}, {[{0x8}, {0x2a39, 0x3}, {0x4}, {0x4}, {0x1, 0x2}, {0x2}, {0x80000000, 0x3}, {0xffffffff00000001, 0x1}, {0x8}, {0x2, 0x2}], [{0x7, 0xfb9e}, {0x7fffffff, 0x80}, {0x3cf, 0x6}, {0xfffffffffffffffe, 0xffffffff}, {0x6, 0x9}, {0x8001, 0x3}, {0xf5afeaa, 0x1}, {0x80000000, 0xa9}, {0x2, 0xfffffffffffffff9}, {0x4, 0x10001}, {0x1f, 0x1}], 0x0, 0x8}, {[{0x8d3, 0x2}, {0x1}, {0x9, 0x1}, {0xfff, 0x3}, {0x2, 0x3}, {0x1000}, {0x6}, {0x9, 0x3}, {0xffff}, {0x6, 0x3}, {0x4}], [{0x2, 0x80000001}, {0x1, 0x4}, {0x5, 0x720}, {0x5, 0x4}, {0x9, 0x7}, {0x7fff, 0x3}, {0x80000000, 0x200}, {0xffffffff94bf1034, 0x3}, {0x3, 0x7}, {0x92, 0x7ff}, {0x100, 0x3f}], 0x3, 0xb}, {[{0x80000000, 0x3}, {0x0, 0x2}, {0x5, 0x2}, {0x211, 0x3}, {0x2}, {0x2, 0x1}, {0xe28, 0x3}, {0x3, 0x1}, {0x1, 0x3}, {0x10001, 0x1}, {0x1de00000}], [{0x1915, 0x9}, {0x7, 0x9}, {0x2, 0x4}, {0x1, 0x1f}, {0x4, 0x3}, {0x8, 0x5}, {0x401, 0x3}, {0x10000, 0x5}, {0x8, 0xfff}, {0x3db}, {0x101, 0x4}], 0xb, 0x6}], 0x1, 0x8}}}, @quota={'quota\x00', 0x18, {{0x0, 0x0, 0x8, 0x100}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@broadcast, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}}, {{{0x3, 0x20, 0x88ff, 'hsr0\x00', 'erspan0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [0xff, 0xff, 0xff, 0x0, 0x5ba44a6677daa45d], @link_local, [0xff, 0x0, 0x0, 0xff, 0xff], 0x128, 0x198, 0x1d0, [@limit={'limit\x00', 0x20, {{0x1, 0x4, 0x3, 0x800000, 0x4bb, 0x5e5}}}, @rateest={'rateest\x00', 0x48, {{'veth0_to_bond\x00', 'caif0\x00', 0x21, 0x1, 0x2, 0x1, 0x7, 0xeeb3, 0x5, 0x9}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffd}}}, @arpreply={'arpreply\x00', 0x10, {{@random="f92402e6aaec", 0xffffffffffffffff}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}]}, 0xde8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000600)={{0x100000001}}) 22:56:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000327}, 0x28) 22:56:44 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x0, 0x1, 0xd1fe}}) [ 2566.415133][T16063] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2566.428744][T16057] IPVS: Scheduler module ip_vs_ú” not found 22:56:45 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r5 = creat(&(0x7f0000000200)='./bus\x00', 0x140) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setsockopt$inet_msfilter(r6, 0x0, 0x29, &(0x7f0000000540)=ANY=[@ANYBLOB="ac1414aae0000001010000000600000000000000ac1414bbac1e0001ac14141a1000004bac1414aa8c18a885a535d52f8456b90122bd5bc0799ab82ef84de7d7fe025b98bafc122d67299ee40a4b185d23a4d37af0be429389e76b1821ca31d78dc908a568b0af254c12ded1de88ac23db7e9e9902034405c41246041df51f5db99eb3ff15456cda5475d504962d341c096778eebcb6c295f5515bd87f7960362e2e7779b9940d1664ed3e211c35226f2ce4478eb3b8f1aff22825b6de25734ecb1922bd1bbc48c5e441a7aba7b020eca3319f41022d7a54bff9a0736a5c6d5a4640b606c3e9ca42535df755c78da1267341508b"], 0x1) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000400)={0xff, 0x0, 0x3}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000440)=0x4) 22:56:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000328}, 0x28) [ 2566.681554][T16074] IPVS: Scheduler module ip_vs_ú” not found [ 2566.777850][T16080] IPVS: Scheduler module ip_vs_ú” not found 22:56:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x0, 0x1, 0xd1fe}}) 22:56:45 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00\x02', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000329}, 0x28) 22:56:45 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000900)=ANY=[@ANYRES32=0x0, @ANYBLOB="fe00000072ca8a1716058e1f547588d498db823cbb7f05390e6e477819e1e140e8508a4b8f3d8060824393f4d47fe45674c515ea8e1257476f3ef659c2106c04000000dce28c2de9d20c175112c3bfc48faebb316081da8d1dddd4cbac722d45af3aab15638ece59218611db1285472aa6d2691b8fd3c217239131c5d951ebd12de9d418ae2a5801000000f9c525bc45947f65a04a329168524727d364f65de14f2b2686e87f7e10686ccadbd39f9a7d16f79977408168c1c7aa25ae60b97822fc688dd5d296027b03eaec771653c06d7055c81ac7ce63b8852afcd6520f8d5e1bb55b69e7bbcdc3e5b2decdac3dada440ee33d5a3036f5e1780e2b8b38088d4b64c51838c8d5e3209fa87a4f51e4d3cd1704822a76bc1badb3aef0ed05f840671f42c1ebd5da5ddd25e947e395cb6d5fd86ef863aea9149102de7b68d127e916709bc40c9ed8bab5bfbc4e792fda63bf92e26b1fe644ced1b7b98a2565a6698089c24c1e9418b125c365fbfe23647e41b000e5914385f1a63199d220f35228e76fecde212d24e0146d6e9dad1b1485814700c47f8d4392aecbb843d8239b1559dc24b7124ef036c09feadf498ce7eb1a02e9fd4a46d1f3e9ef30a5891cddd4b25dc8d60bb28304dfe59af2a084edb34fa16b88fde548ee9a178b00cdc4d4e45ec90ee18fc259bb2e379022dcad0992941074565087c746a0fe2b13e1e2e44534ae5633b09b437be78c15b4b4d505838b79fc0f3aa75887ece94d92a00809acfeb4a9194b3f20c2604662044"], &(0x7f00000003c0)=0x106) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000400)=@assoc_value={r5, 0x4}, &(0x7f00000005c0)=0x8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:45 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:45 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0xfeffffff00000000}}}], 0xffffff76) [ 2567.051633][T16095] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2567.102372][T16094] IPVS: Scheduler module ip_vs_ú” not found 22:56:45 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x6) ioctl$TIOCGPTPEER(r1, 0x5441, 0x3) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:45 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00\x03', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000032a}, 0x28) [ 2567.311071][T16112] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x0, 0x1, 0xd1fe}}) 22:56:46 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00\x04', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2567.363294][T16113] IPVS: Scheduler module ip_vs_ú” not found 22:56:46 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0x4, 0x1, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000480)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xe8) setfsuid(r5) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0xfffffffffffffe2c, &(0x7f00000001c0)={&(0x7f0000000580)=@canfd={{0x3, 0x0, 0x4, 0x5}, 0x3f, 0x1, 0x0, 0x0, "9991b95bf300055ac1b650a0d7fe6d4538154941df15c6d40df90ae47be8afece9c20287888f3da70474ab2427dc2b8a114b3e6fd33adb1376e513cd9eb53482"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000032b}, 0x28) 22:56:46 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={@remote={[], 0x2}, 0xa, 'veth0_to_hsr\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2567.512426][T16126] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:46 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00\x05', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000032c}, 0x28) [ 2567.695104][T16142] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2567.779988][T16141] IPVS: Scheduler module ip_vs_ú” not found 22:56:46 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x0, 0xd1fe}}) 22:56:46 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00\x06', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:46 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0xffffffff00000000}}}], 0xffffff76) 22:56:46 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x3fffffffffffffff, 0x45) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f00000004c0)={0x0, 0x101, 0x7, [], &(0x7f0000000480)=0xfffffffffffffff9}) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000400)={0x0, 0x4, 0x1, &(0x7f00000003c0)=0x4}) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x40000002) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000032d}, 0x28) 22:56:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000032e}, 0x28) [ 2568.194663][T16166] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2568.241117][T16165] IPVS: Scheduler module ip_vs_ú” not found 22:56:46 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00\a', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:47 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x0, 0xd1fe}}) 22:56:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000032f}, 0x28) [ 2568.425814][T16184] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:47 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00\x11', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2568.529865][T16189] IPVS: Scheduler module ip_vs_ú” not found [ 2568.623091][T16200] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:47 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:47 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000480)={0x8000, 0xdc, 0xe1, 'queue1\x00', 0x9}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) syz_open_dev$sndtimer(0x0, 0x0, 0x200) 22:56:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x0, 0xd1fe}}) 22:56:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000330}, 0x28) 22:56:47 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00 ', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:47 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0xffffffffffff0700}}}], 0xffffff76) 22:56:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000331}, 0x28) [ 2569.229161][T16213] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2569.344214][T16218] IPVS: Scheduler module ip_vs_ú” not found 22:56:48 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00?', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:48 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x20004, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) accept$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x14) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x1d, r5}, 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x10}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) sendmsg$tipc(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f00000004c0)="70d97231b6e037797355386e45e8b0e2197896064c5dd2f0adbd631d54daee961756", 0x22, 0x1}, 0x80) 22:56:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1}}) 22:56:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000332}, 0x28) [ 2569.585212][T16239] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:48 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00H', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2569.687145][T16242] IPVS: Scheduler module ip_vs_ú” not found [ 2569.795708][T16254] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:48 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000333}, 0x28) 22:56:48 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00L', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1}}) 22:56:48 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0xffffffffffffff7f}}}], 0xffffff76) 22:56:48 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) accept4(r1, 0x0, &(0x7f00000003c0), 0x80000) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) sendmmsg$alg(r1, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000400)="613c421bfbae47d5d194fe2862eb36eaa4", 0x11}, {&(0x7f0000000480)="fa44f975dcb46ea7d2f130b5ad5fead37292097e8419ae25dc5ea74b48123c7023bf5fd99958c6937aea94bdbe894e4bc6139d5f454c5a50a48b41efc255fb6e747d58826f59873ef17cf7d4b6810dd066f3527d8cb4ef9ba3b10c44c9845de89d17ee55e1b9b352cec317ff7d0093a47f12c6c2bfff87", 0x77}, {&(0x7f0000000500)="5b2e8c4a27281bac3e055073fae8bbe3909cddcdcebb7b8192a048d2982aa4abd0d1696536ebbb001b16d96ebc8aa5ab2ba46c34321cbf00ebf388e56dfcb557ac0077ff9dcdbf1a543323113b15a7958432662dedadc68b1db453c5275ee0293b282ad3beb918275a550eca04175a835130f11f830b4cd5d462d2160aae329bc8c46ffdab086a0250e075fc07876f2845df0d3678e3c6eb06c1f3241b2341d77bdcc3210c62661b430ca023d5a480b988e7375b267dca3c71cac905b73226fb92760bd97fa2d1e49491876f41004d79e63d3f2588", 0xd5}], 0x3, 0x0, 0x0, 0x10}], 0x1, 0x0) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2570.155471][T16262] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2570.201485][T16269] IPVS: Scheduler module ip_vs_ú” not found 22:56:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000334}, 0x28) 22:56:48 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00`', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:48 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000003c0)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000400)=r5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1}}) [ 2570.396604][T16285] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:49 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00h', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000335}, 0x28) [ 2570.506903][T16289] IPVS: Scheduler module ip_vs_ú” not found [ 2570.552701][T16299] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:49 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:49 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00l', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:49 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000480)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, 0x1, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f00000003c0)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x9, &(0x7f0000000300)=0x200000000000, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000336}, 0x28) 22:56:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000328}, 0x28) 22:56:49 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x2}}}], 0xffffff76) [ 2571.260517][T16317] IPVS: Scheduler module ip_vs_ú” not found [ 2571.264667][T16321] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000324}, 0x28) 22:56:50 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00t', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000337}, 0x28) 22:56:50 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f00000003c0)={0x9}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000323}, 0x28) [ 2571.491158][T16339] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:50 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00z', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2571.656370][T16343] IPVS: Scheduler module ip_vs_ú” not found [ 2571.809996][T16356] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:50 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:50 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000003c0)={'rose0\x00', {0x2, 0x4e24, @remote}}) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000338}, 0x28) 22:56:50 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x00\x00\x88', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000031e}, 0x28) 22:56:50 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x3}}}], 0xffffff76) [ 2572.148765][T16368] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2572.181925][T16366] IPVS: Scheduler module ip_vs_ú” not found 22:56:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000030f}, 0x28) 22:56:50 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\a\xff\xff\xfe', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:50 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0xff, 0x400) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) r5 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r5, 0x1000) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f0000000480)=@canfd={{0x4, 0x3, 0x5, 0x3}, 0x3f, 0x1, 0x0, 0x0, "21e399562cd3cef8352d8c6234e7240ffa1c60d5cb07851797d45d491d86226d9cbf48219ea27c03ba4619803f965b8e569be4c37cfdc36d91530cf4b34ef47b"}, 0x48}, 0x1, 0x0, 0x0, 0x8806}, 0x2000003c) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000339}, 0x28) [ 2572.375221][T16383] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000338}, 0x28) 22:56:51 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\xff\xff\xff\xff', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2572.517955][T16387] IPVS: Scheduler module ip_vs_ú” not found [ 2572.583051][T16399] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:51 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000033a}, 0x28) 22:56:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000338}, 0x28) 22:56:51 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x44000, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x410200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x2000000d, &(0x7f0000000000)=0x40000200, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xcc1b, &(0x7f0000000180)=[{&(0x7f0000000900)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000400)={0x80, 0xb4df, 0x839, 0x1, 0x5}) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x40) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001, 0x0, 0x0, 0x0, 0x200000000000}}) 22:56:51 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x02\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:51 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x6}}}], 0xffffff76) 22:56:52 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x8, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2573.342462][T16418] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2573.354183][T16411] IPVS: Scheduler module ip_vs_ú” not found [ 2573.382143][T16411] IPVS: Scheduler module ip_vs_ú” not found 22:56:52 executing program 3: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:52 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x03\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000033b}, 0x28) [ 2573.567135][T16430] IPVS: Scheduler module ip_vs_ú” not found [ 2573.612924][T16440] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:52 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x04\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2573.701262][T16441] IPVS: Scheduler module ip_vs_ú” not found 22:56:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000033c}, 0x28) [ 2573.815479][T16452] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:52 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:52 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00\x00\x00\x00\xeb\xff\xff\xff\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x5) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x200) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x406244) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:52 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x05\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000033d}, 0x28) 22:56:52 executing program 3: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:53 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x8}}}], 0xffffff76) [ 2574.358705][T16469] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000033e}, 0x28) 22:56:53 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x06\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2574.464941][T16466] IPVS: Scheduler module ip_vs_ú” not found [ 2574.634959][T16490] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:53 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000400)=0x8) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2574.791630][T16494] IPVS: Scheduler module ip_vs_ú” not found 22:56:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000033f}, 0x28) 22:56:53 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\a\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:53 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000240)=0x15) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000400)=0x1, 0x4) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x5) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) open$dir(&(0x7f00000003c0)='./file0\x00', 0x8000, 0x139) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2574.966554][T16502] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2575.074574][T16502] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2575.098303][T16505] IPVS: Scheduler module ip_vs_ú” not found 22:56:53 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:53 executing program 3: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:53 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$mouse(&(0x7f00000003c0)='/dev/input/mouse#\x00', 0x7, 0x42000) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000004c0), &(0x7f0000000500)=0x8) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000580)=""/28, &(0x7f0000000480)=0x17) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x5) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) syz_open_dev$sndtimer(0x0, 0x0, 0x200) 22:56:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000340}, 0x28) 22:56:53 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x11\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2575.351408][T16522] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:54 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0xc}}}], 0xffffff76) 22:56:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000341}, 0x28) 22:56:54 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:54 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00H\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2575.682113][T16536] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000033b}, 0x28) [ 2575.816524][T16538] IPVS: Scheduler module ip_vs_ú” not found 22:56:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000342}, 0x28) 22:56:54 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00L\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2576.050917][T16555] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:55 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:55 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00`\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:55 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x4188c3, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f00000003c0)={0xdad, 0x615, 0x5, 0x3ff}, 0x10) truncate(0x0, 0x0) ioctl$VT_WAITACTIVE(r1, 0x5607) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000343}, 0x28) 22:56:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff000002f7}, 0x28) [ 2576.493800][T16571] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000344}, 0x28) [ 2576.555790][T16570] IPVS: Scheduler module ip_vs_ú” not found 22:56:55 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x10}}}], 0xffffff76) 22:56:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff000002f6}, 0x28) 22:56:55 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00h\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:55 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000003c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000480)={r5, 0x3, 0x4e4, 0x80000001}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000345}, 0x28) [ 2576.758111][T16589] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:55 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x0, {0x2, 0x4e24, @loopback}, {0x2, 0x4e24, @empty}, {0x2, 0x4e23, @loopback}, 0x18, 0x0, 0x0, 0x0, 0xffff, &(0x7f00000003c0)='ip_vti0\x00', 0x6, 0x9, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2576.817814][T16590] IPVS: Scheduler module ip_vs_ú” not found [ 2577.018948][T16600] IPVS: Scheduler module ip_vs_ú” not found 22:56:56 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:56 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00l\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:56 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCGIFCONF(r4, 0x8912, &(0x7f00000003c0)=@buf={0xc7, &(0x7f0000000480)="8ec75125e37ed00c535907072ff76bb0b0998cdae423a353694072ed141235436143fe0f90cf364ebd0a7dcaee94673b77fbea317cd68d1e2889feee57f24ca75c39b2b0638bf310972653aa1e61912d39316854760e63f274febc638d35b640539d16e66dbad40568fc1968ae2f684cee2f76c4dd8dfcb6bba14a60f53174019b77e4dd8b754505cadfa71e3984cb65c0db006a0db513443a44f2fb88311683cfae2d7d93818112d71306baf48b505f323ae97fd5cadfceaf03c8eff423b7ed889b09a0b7b07c"}) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000400)={{0x2, 0x1, 0x6, 0x0, 0x9}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0505405, &(0x7f0000000580)={{0x100000001, 0x4, 0x0, 0x0, 0xfffffffffffffffc}}) 22:56:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff000002eb}, 0x28) 22:56:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000346}, 0x28) 22:56:56 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x300}}}], 0xffffff76) [ 2577.420485][T16612] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000347}, 0x28) [ 2577.500821][T16612] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2577.511998][T16619] IPVS: Scheduler module ip_vs_ú” not found 22:56:56 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00t\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff000002eb}, 0x28) 22:56:56 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x401, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000780)={{0x9}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x100000001) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r5, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r5, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2577.654397][T16633] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:56 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00z\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff000002eb}, 0x28) [ 2577.759114][T16638] IPVS: Scheduler module ip_vs_ú” not found [ 2577.856742][T16649] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:56 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000348}, 0x28) 22:56:56 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x4e22, 0x0, 'fo\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000003c0)=0x5, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r4 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000400)={'ipvs\x00'}, &(0x7f0000000480)=0x1e) 22:56:56 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x88\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:56:56 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x600}}}], 0xffffff76) 22:56:56 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x2) recvmsg(r5, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYRESOCT=r0], 0x17) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r7 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r7, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2578.291308][T16666] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000349}, 0x28) 22:56:57 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x03\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:56:57 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$SIOCRSACCEPT(r1, 0x89e3) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000006ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) recvmmsg(r4, &(0x7f0000002180)=[{{&(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000480)=""/109, 0x6d}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000580)=""/203, 0xcb}, {&(0x7f0000000680)=""/37, 0x25}], 0x4}, 0x9}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000700)=""/63, 0x3f}, {&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000000740)=""/41, 0x29}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000004ac0)=""/4096, 0x1000}], 0x6, &(0x7f0000001a00)=""/66, 0x42}, 0x5}, {{&(0x7f0000001a80)=@caif=@dgm, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001b00)=""/150, 0x96}, {&(0x7f0000001bc0)=""/231, 0xe7}, {&(0x7f0000001cc0)=""/196, 0xc4}, {&(0x7f0000000880)}], 0x4, &(0x7f0000001e00)=""/114, 0x72}, 0x200}, {{0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e80)=""/14, 0xe}, {&(0x7f0000001ec0)=""/123, 0x7b}, {&(0x7f0000001f40)=""/210, 0xd2}, {&(0x7f0000005ac0)=""/4096, 0x1000}, {&(0x7f0000002040)=""/127, 0x7f}, {&(0x7f00000020c0)=""/52, 0x34}], 0x6}, 0x7}], 0x4, 0x10102, &(0x7f0000002280)={0x0, 0x1c9c380}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2578.513417][T16681] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2578.544355][T16683] IPVS: Scheduler module ip_vs_ú” not found 22:56:57 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x05\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2578.837293][T16697] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2578.923213][T16695] IPVS: Scheduler module ip_vs_ú” not found 22:56:57 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:56:57 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x06\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000034a}, 0x28) 22:56:57 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f00000003c0)) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendto$inet6(r0, &(0x7f0000000480)="803c501686182986431fb2ab1aecc4c486ee8924dac4159bdd5a5d4b8b5fde33524cf0fb1259c28ec6912a1b949ae0f3c68c79e7415115ddbc7760965df83029a051aa1b5429e4dd07f878b28c1d6d804f2623b93779c6b6d1898b1f9744c133d8219281846ac22cb886588c22b28c4a19c72f62ce57391abf23d36811554fa0b9ac5bad15aabe45d3651f0085814cd1b33f4680861170ec9fe91e237047a783b7c9213ec74cacf58408379ac6e1af", 0xaf, 0x1, &(0x7f0000000400)={0xa, 0x4e22, 0x7, @loopback, 0xfffffffffffffffe}, 0x1c) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:57 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0xc00}}}], 0xffffff76) 22:56:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) [ 2579.390040][T16718] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:58 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\a\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2579.437571][T16711] IPVS: Scheduler module ip_vs_ú” not found 22:56:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x4000000000007, 0x44, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x1000, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0xa, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x1, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x200000000000000) socket$caif_stream(0x25, 0x1, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0x2f6}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f00000003c0)={0x6, 0x30313953, 0x56, 0x8, 0x3, @discrete={0x8, 0x8}}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x8020000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x807, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x1d, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000480)={0x4, 0xd, "c2fd861560b5be83c6b4908e18b1dc6c38208f3246fc226702c29cba04db3256", 0xe963, 0x4, 0x8, 0x4, 0x100}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000034b}, 0x28) 22:56:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) [ 2579.577474][T16731] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:56:58 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000034c}, 0x28) 22:56:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:56:58 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x11\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:58 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r6, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r6, 0x4004af07, &(0x7f0000000140)={0x3f00}) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000480)=@nfc, 0x135, &(0x7f0000000180)=[{&(0x7f0000000900)=""/4096, 0x1000}], 0x1, &(0x7f00000001c0)=""/20, 0x14}, 0x2000) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 22:56:58 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x3f00}}}], 0xffffff76) [ 2580.244559][T16761] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:58 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:56:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000034d}, 0x28) [ 2580.321996][T16763] IPVS: Scheduler module ip_vs_ú” not found 22:56:59 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00 \x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2580.387663][T16772] IPVS: Scheduler module ip_vs_ú” not found 22:56:59 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f00000003c0)) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(r0, 0x8000000001, r0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcaf}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000008000002, &(0x7f0000000000)=0x8000000200, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0xfffffffffffffeb9, 0x200000000000000, &(0x7f00000004c0)={0x2, 0x4e22, @multicast1}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) fcntl$setsig(r0, 0xa, 0x35) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r5, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f00000008c0)=ANY=[@ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRESHEX=r3, @ANYBLOB="d50d6a7dbdac93b0d3ef3dc61b6452c76ca27ed8eb5ffa52c850718f93727bfa110ddb9ae14cdad3540de787d077b2db475ea925d9857f4a99ad488140", @ANYRES32=r3, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES16=r0, @ANYRESHEX=r5, @ANYRES16, @ANYRES64=r6], @ANYRESOCT=r4], @ANYRESDEC=0x0, @ANYRESOCT=0x0, @ANYRES64=r2, @ANYBLOB="f216476b685aaf66bf96faccbff45d06b3aa3d70f6bc0c58ac439f5ea4570faceaf2953cc64000ff596e33e9a5df500cad31db6e20c735ab60bcacf67e9dfc097dd5d10fbf0ad4efa5666f37a2b9fa368aaf64a0ab64701d8a2469d93463b8c564ade73d7cc17ba64dc904884256dd9a"], 0x10000003e) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0505405, &(0x7f0000000000)={{0x100000005, 0x0, 0x2}}) 22:56:59 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) [ 2580.551606][T16784] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:59 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00?\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2580.685127][T16787] IPVS: Scheduler module ip_vs_ú” not found [ 2580.788165][T16797] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:59 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000034e}, 0x28) 22:56:59 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) sendmsg$inet_sctp(r3, &(0x7f0000001a40)={&(0x7f00000003c0)=@in6={0xa, 0x4e22, 0x3, @loopback, 0x544b}, 0x1c, &(0x7f0000001980)=[{&(0x7f0000000480)="c7c264e0b39cefb0fedc35f31f93bc18d0782cf7d457d1f2521a6e4485095e58dde18ecdff60a56579ae4c9831dc5ac83521908f91f9dda8122384f00c4c23c31f0cf853a86b7efd38ebb4358ac01db30fe06e5d8c7ec2fc04674fb0e7831dc1784a40eaadb283b5ccc0b2c0279fb00f09077e5b576ee324bc5e8ce2c2db3713439ab84d991c4b30ec2d2cc5cbf1864f24e9dc2596961da4e0be0ede0f2f1db5c4cb7ef2", 0xa4}, {&(0x7f0000000540)="3de4edb3728f9f866309f0d6bdf412a97d8818efb90b8a100ccf170d9c681c32239f5e030520f64872156c5f393b1bd2187141a2d20b49528ac2385acd9cecaa936d47ac19b68c2f1dd2701cec05e129dd0782f369ad97d84d8254a5a885c2f4aa36cce3b499187d3057414f63b419f8bf6bd85a04ee2784cfbe0feb4c66abc5918b4b6846ba5579fb585722a13c7e9c0b57ce3310943b8595050a2ffa0c4fa57158e513c2b628b0758b8bae762b94ca794f003b26c51e3298ae20ee49f86dcb9dcf58743638b8fbd09dc0a9ea1087370300656efb4168bd47fccf6c5abeff8a83a307dfa5f9", 0xe6}, {&(0x7f0000000400)="8f81f57ed51fbf3de2", 0x9}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f0000000640)="c91f2ea684c8a394d7a6044bce7f8e9a3f96e4801434142b3d41d761ba8ad71329ac87c1210c61d60ee65cdef298450326176b3b43398cd7f1ce430ff0262ea6657e961b803222bf4cace51745703b7d8be61e97206ff9830a0516ceb392d18addf544e8", 0x64}, {&(0x7f00000006c0)="4c7a38c287fc71131d4a04a1811e9141b57155349f935ef17901486fb8ac9b837540996a445c0734a375dd79647dc47641cdb6d4840c0117527efadeca128c8586b104e9db05088cd30607fcc0412d1245d284a7d474dcc2c3c415b62b04aa7b3a483fdee91a8a19a28b26219539646bb4ca10f7611d47537e92367e06f585ded01f43c4b7f81a5977f542a3172ee56fd83586f66e0ff39fe751ebbe", 0x9c}, {&(0x7f0000000800)="08310b56ceb48bdf23dc7d5121d3c825113fde36d71605e2dcd8", 0x1a}, {&(0x7f0000000840)="36524d551d5691c24dfcb92c6021bb6a8ed7aea148db80536856d1f1b0e4200e29691dcd2d70dcf489b3cfa0662582a64c437f052c0b42cae614fc439c863509e28e305459a3505b7ff9414058cb3e9820ef8992fb0d44e201acd9f17857e9f0cc9ddd2a4b59bf", 0x67}, {&(0x7f0000001900)="adf857ed3a7f1da42a420139f06d8b593d612fe3fc718a99f592bfe1844cca996d3ebbc2f4c9e3b8c14e10f8476dd8c1368f8b14ed7d961b7cceca0f0d899bcac3c658b210c8bcab7112aa8c01c83759f8936c4061ed273d56ed072926391148a7c4da531e7f0c1db240f566728f8a8d93191cb6f334a381f1824f997a1310", 0x7f}], 0x9, 0x0, 0x0, 0x8055}, 0x8080) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:56:59 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:56:59 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00H\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:56:59 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x8008}}}], 0xffffff76) [ 2581.155786][T16808] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:56:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:56:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000034f}, 0x28) 22:56:59 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00L\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2581.236798][T16812] IPVS: Scheduler module ip_vs_ú” not found 22:57:00 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r5, 0x3d2e4ce9ae817560, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5159}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000480)={0x2, 0xf, 0x4, 0x1000000, {0x0, 0x2710}, {0x3, 0x8, 0x3, 0xffff, 0x8000, 0x7fffffff, "54292a15"}, 0x4, 0x3, @planes=&(0x7f00000003c0)={0x0, 0xb31f, @userptr=0x7fffffff, 0x2}, 0x4}) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2581.378587][T16827] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000350}, 0x28) [ 2581.588537][T16837] IPVS: Scheduler module ip_vs_ú” not found 22:57:00 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:00 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00`\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000351}, 0x28) 22:57:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:00 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:00 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x100000}}}], 0xffffff76) [ 2582.070717][T16862] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) [ 2582.121314][T16858] IPVS: Scheduler module ip_vs_ú” not found 22:57:00 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00h\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:00 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) accept$packet(r0, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000fc0)=0x14) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000001000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6, 0xffffffff, 0x100, 0x500, 0xffd, 0x1000000, r6}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2582.262746][T16874] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000352}, 0x28) 22:57:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:01 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00l\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2582.461521][T16880] IPVS: Scheduler module ip_vs_ú” not found [ 2582.470074][T16889] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:01 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000353}, 0x28) 22:57:01 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) syz_open_dev$midi(&(0x7f0000000400)='/dev/midi#\x00', 0x9, 0x80) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x3cd, &(0x7f00000001c0)={&(0x7f0000000480)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f00000003c0)={0x77359400}, 0x10) 22:57:01 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00t\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:01 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x1000000}}}], 0xffffff76) [ 2582.989821][T16910] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:01 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00z\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2583.032182][T16908] IPVS: Scheduler module ip_vs_ú” not found 22:57:01 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f00000003c0), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) uname(&(0x7f0000000900)=""/4096) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000354}, 0x28) 22:57:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, 0x0, 0x0) [ 2583.199606][T16926] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:01 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x88\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2583.296068][T16925] IPVS: Scheduler module ip_vs_ú” not found [ 2583.399326][T16938] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:02 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000355}, 0x28) 22:57:02 executing program 3: 22:57:02 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab, 0xfffffffffffffffe}, {}, 0x102, 0x8000000000000003, 0x20}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0xffffff0c) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:02 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x01\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:02 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x2000000}}}], 0xffffff76) 22:57:02 executing program 3: [ 2584.009213][T16949] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:02 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x02\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000356}, 0x28) [ 2584.113252][T16951] IPVS: Scheduler module ip_vs_ú” not found 22:57:02 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x800, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:02 executing program 3: 22:57:02 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x46, 0x6) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2584.298528][T16971] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2584.487519][T16980] IPVS: Scheduler module ip_vs_ú” not found 22:57:03 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:03 executing program 3: 22:57:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000357}, 0x28) 22:57:03 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) write$binfmt_elf64(r1, &(0x7f0000000900)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x1, 0x49e0, 0xfffffffffffff495, 0x9, 0x0, 0x6, 0x81, 0x38c, 0x40, 0xa8, 0xfffffffffffffff8, 0x10001, 0x38, 0x2, 0x7f, 0x1, 0x5}, [{0x7, 0x4, 0x95, 0x3, 0x0, 0x3f, 0x4, 0x100}, {0x6474e551, 0xd7c, 0x6, 0x2138, 0xfffffffffffffff9, 0x9, 0x2648, 0xfffffffeffffffff}], "8ed381994e3ff2d91c3671920a25b0ab6eccc314676ef762affdeb08", [[], [], [], [], []]}, 0x5cc) recvmsg(r5, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r5, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:03 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x3000000}}}], 0xffffff76) 22:57:03 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x03\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2584.923939][T16992] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:03 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x04\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2584.979368][T16988] IPVS: Scheduler module ip_vs_ú” not found 22:57:03 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000300)) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000003c0)={0x0, 0x200000000003ff, 0xffffffffffffffff, {}, 0x9, 0x80000004}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:03 executing program 3: 22:57:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000358}, 0x28) 22:57:03 executing program 3: [ 2585.144381][T17010] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2585.171633][T17005] IPVS: Scheduler module ip_vs_ú” not found 22:57:03 executing program 3: 22:57:04 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:04 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x05\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:04 executing program 3: 22:57:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000359}, 0x28) 22:57:04 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:04 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x6000000}}}], 0xffffff76) [ 2585.830129][T17029] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:04 executing program 3: 22:57:04 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x06\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2585.893466][T17035] IPVS: Scheduler module ip_vs_ú” not found 22:57:04 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x10001, 0x1, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_bp={&(0x7f00000003c0), 0x5}, 0x8000, 0x0, 0x0, 0x8, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'a\x957\x00\x00\x00\x00\x00\x00\x16\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000400)={0x31, 0x10001, 0xa, 0xa, 0xdd3c, 0x81}) write$P9_RUNLINKAT(r1, &(0x7f0000000480)={0x7, 0x4d, 0x2}, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000035a}, 0x28) 22:57:04 executing program 3: [ 2586.046418][T17047] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:04 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\a\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2586.179251][T17054] IPVS: Scheduler module ip_vs_ú” not found [ 2586.277143][T17063] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:05 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:05 executing program 3: 22:57:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000035c}, 0x28) 22:57:05 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:05 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\xfe\xff\xff\a\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:05 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x8000000}}}], 0xffffff76) 22:57:05 executing program 3: [ 2586.762585][T17074] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:05 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x11\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:05 executing program 3: [ 2586.857614][T17077] IPVS: Scheduler module ip_vs_ú” not found 22:57:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000035d}, 0x28) [ 2586.927935][T17083] IPVS: Scheduler module ip_vs_ú” not found [ 2586.969702][T17093] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:05 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r7 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000480)={0x1ff, 0xffffffffffffffe0, 0x4, 0x0, 0x0, [{r6, 0x0, 0x101}, {r3, 0x0, 0x4a}, {r5, 0x0, 0x4c2d15c6}, {r7, 0x0, 0x42cb}]}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r7, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:05 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00 \x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2587.165329][T17106] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2587.196973][T17103] IPVS: Scheduler module ip_vs_ú” not found 22:57:06 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:06 executing program 3: 22:57:06 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00?\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000035e}, 0x28) 22:57:06 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x8800000}}}], 0xffffff76) 22:57:06 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x3) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) socket$l2tp(0x18, 0x1, 0x1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:06 executing program 3: [ 2587.649542][T17120] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000035f}, 0x28) [ 2587.710892][T17123] IPVS: Scheduler module ip_vs_ú” not found 22:57:06 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0xe, 0x4) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0xfffffffffffffffe) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:06 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:06 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00H\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:06 executing program 3: [ 2587.902463][T17141] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:06 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00L\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:06 executing program 3: 22:57:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000360}, 0x28) [ 2588.160435][T17157] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:06 executing program 3: 22:57:07 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0xc000000}}}], 0xffffff76) 22:57:07 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) mq_getsetattr(r1, &(0x7f00000003c0)={0x0, 0x21b, 0x5, 0x3, 0x2, 0x5, 0x2, 0x3}, &(0x7f0000000400)) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:07 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00`\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000361}, 0x28) 22:57:07 executing program 3: [ 2588.652256][T17180] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2588.672901][T17170] IPVS: Scheduler module ip_vs_ú” not found 22:57:07 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:07 executing program 3: 22:57:07 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000140)={'ah\x00\x00iL<\x00\x00\x00\x00\x00\x00m\xd9\x00'}, 0x0) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000003c0)=0x3ff, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000480)={0xe, 0x8, 0x0, 0xba0000, 0xe6, "7a04ef2afef337020e3ca76b3dbee43498d6abe81a186419d463d84f42ea5d5e9ff2c9d1bfd12fd52accd42cf637ad6ef6b7193faae879ba1d1d5e2dcda6cea55d4e6805a584ddc526e5429aedc4fb75acad271e5e41fad48dd9c0905d02feb32c8ad1b117a4ada2d6e91e9654ba3c531be8033abfb2345738ff2cb8533c2b581aa6c40ac7c4ab97b876f6b9bbe9eb5d6bb793224f39ec92f39257aa6340721b704aa35ea1f84af13492b0d4a79c3a6809884c2c55356b75dd6e30d9036a4fb81a14b913edaf141d4dfe0540ea3fa86753f68eba97027db9359d2a208fb9c42969698c8ba475"}, 0xf2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000400)=0x7, 0x4) r4 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:07 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00h\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000362}, 0x28) [ 2589.041011][T17192] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:07 executing program 3: [ 2589.132098][T17194] IPVS: Scheduler module ip_vs_ú” not found 22:57:07 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00l\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:07 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x10000000}}}], 0xffffff76) 22:57:07 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000363}, 0x28) 22:57:07 executing program 3: [ 2589.283064][T17211] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2589.355375][T17211] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2589.376720][T17213] IPVS: Scheduler module ip_vs_ú” not found 22:57:08 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2589.653760][T17226] IPVS: Scheduler module ip_vs_ú” not found 22:57:08 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:08 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00t\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:08 executing program 3: r0 = open(&(0x7f0000000340)='./file0\x00', 0x200000040c2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$eventfd(r0, &(0x7f0000000040)=0x6, 0x8) 22:57:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000364}, 0x28) 22:57:08 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0x80cab}, {0x0, 0x800}, 0xff, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0xfffffdcd) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) write$P9_RSYMLINK(r0, &(0x7f0000000480)={0x14, 0x11, 0x2, {0x0, 0x1, 0x5}}, 0x14) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000003c0)=@canfd={{0x4, 0x7, 0x10000, 0x2}, 0x23, 0x1, 0x0, 0x0, "6387f6ed1b54b5a984dd9aca51b39aab5207c56364282bae53bc8b756590c4b03198cc6dc45ffbf8ddb4a06369a77981da506e3b080c038fa0fe5edc23499b8f"}, 0x48}, 0x1, 0x0, 0x0, 0x8806}, 0x80) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:08 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x3f000000}}}], 0xffffff76) [ 2589.961005][T17240] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2590.007180][ T26] audit: type=1800 audit(1547593028.638:74): pid=17245 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor3" name="file0" dev="sda1" ino=17313 res=0 22:57:08 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00z\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000365}, 0x28) 22:57:08 executing program 3: syz_execute_func(&(0x7f00000002c0)="3666440f50f56664400f9f3241c3c4e2c99758526e59c7427d2a2a0087f2470f1185070000003e0f1110c442019dccc4037d19d4686f") r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r1}) fcntl$getown(r0, 0x9) [ 2590.254118][T17260] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:08 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_generic(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000000640)={0x18, 0x12, 0xe01, 0x0, 0x25dfdbfd, {}, [@nested={0x4, 0x3}]}, 0x18}, 0x1, 0x0, 0x0, 0x11}, 0x0) 22:57:09 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) getsockopt$IPT_SO_GET_REVISION_MATCH(r4, 0x0, 0x42, &(0x7f00000003c0)={'icmp\x00'}, &(0x7f0000000400)=0x1e) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x26a) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:09 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x88\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2590.548848][T17271] IPVS: Scheduler module ip_vs_ú” not found [ 2590.617328][T17278] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:09 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000366}, 0x28) 22:57:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xd}, 0x2c) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x10000000000003, 0x0, &(0x7f0000001400)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000200)}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x9, 0x20, 0x80, 0x8}, 0x2c) socketpair(0x80000000001, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='0\x00') 22:57:09 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x100000000000a, 0x100000) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:09 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\a\xff\xff\xfe\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:09 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0xfeffffff}}}], 0xffffff76) [ 2591.148476][T17292] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:09 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000367}, 0x28) 22:57:10 executing program 3: ptrace$getsig(0x4202, 0x0, 0x8, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x989680}) bind$netlink(0xffffffffffffffff, &(0x7f0000000100), 0xc) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) [ 2591.406477][T17308] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:10 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000880)={0x0, @loopback, @broadcast}, &(0x7f0000001900)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001940)={'team0\x00', r4}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r5, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r5, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:10 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000368}, 0x28) [ 2591.736179][T17321] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:10 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000353}, 0x28) 22:57:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000369}, 0x28) 22:57:10 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:10 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0xfffffffe}}}], 0xffffff76) [ 2592.364512][T17337] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000036a}, 0x28) 22:57:11 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000348}, 0x28) [ 2592.630787][T17349] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:11 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2592.895975][T17358] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:14 executing program 3 (fault-call:2 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000036b}, 0x28) 22:57:14 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:14 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x800800000000}}}], 0xffffff76) 22:57:14 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:14 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000003c0)=0xfffffffffffffda2) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1f) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r4 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000400)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000480)={r5}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2595.620041][T17364] FAULT_INJECTION: forcing a failure. [ 2595.620041][T17364] name failslab, interval 1, probability 0, space 0, times 0 [ 2595.660613][T17372] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2595.690245][T17364] CPU: 0 PID: 17364 Comm: syz-executor3 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2595.699301][T17364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2595.709367][T17364] Call Trace: [ 2595.712679][T17364] dump_stack+0x1db/0x2d0 [ 2595.717029][T17364] ? dump_stack_print_info.cold+0x20/0x20 [ 2595.722764][T17364] should_fail.cold+0xa/0x14 [ 2595.727367][T17364] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2595.733182][T17364] ? ___might_sleep+0x1e7/0x310 [ 2595.738040][T17364] ? arch_local_save_flags+0x50/0x50 [ 2595.743330][T17364] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2595.749594][T17364] __should_failslab+0x121/0x190 [ 2595.754536][T17364] should_failslab+0x9/0x14 [ 2595.759059][T17364] __kmalloc+0x2dc/0x740 [ 2595.763305][T17364] ? crypto_larval_alloc+0x1e0/0x1e0 [ 2595.768595][T17364] ? crypto_create_tfm+0x88/0x310 [ 2595.773635][T17364] crypto_create_tfm+0x88/0x310 [ 2595.778492][T17364] crypto_alloc_tfm+0x104/0x2f0 [ 2595.783402][T17364] crypto_alloc_ahash+0x2d/0x40 [ 2595.788286][T17364] hash_bind+0x26/0x30 [ 2595.792388][T17364] alg_bind+0x25d/0x570 [ 2595.796568][T17364] ? security_socket_bind+0x93/0xc0 [ 2595.801770][T17364] __sys_bind+0x30b/0x420 [ 2595.806125][T17364] ? __ia32_sys_socketpair+0xf0/0xf0 [ 2595.811424][T17364] ? trace_hardirqs_on+0xbd/0x310 [ 2595.816468][T17364] ? __ia32_sys_read+0xb0/0xb0 [ 2595.821240][T17364] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2595.827313][T17364] ? trace_hardirqs_off_caller+0x300/0x300 [ 2595.833127][T17364] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2595.838617][T17364] __x64_sys_bind+0x73/0xb0 [ 2595.843140][T17364] do_syscall_64+0x1a3/0x800 [ 2595.847736][T17364] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2595.853405][T17364] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2595.859146][T17364] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2595.864734][T17364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2595.870659][T17364] RIP: 0033:0x457ec9 [ 2595.874583][T17364] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2595.894180][T17364] RSP: 002b:00007f0877060c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 2595.902587][T17364] RAX: ffffffffffffffda RBX: 00007f0877060c90 RCX: 0000000000457ec9 [ 2595.910568][T17364] RDX: 0000000000000058 RSI: 0000000020000240 RDI: 0000000000000003 [ 2595.918547][T17364] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2595.926528][T17364] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08770616d4 [ 2595.934519][T17364] R13: 00000000004bdf0a R14: 00000000004ce160 R15: 0000000000000004 22:57:14 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000036c}, 0x28) [ 2596.092678][T17381] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:14 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000036d}, 0x28) [ 2596.296163][T17388] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:15 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) [ 2596.498167][T17398] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000036e}, 0x28) 22:57:15 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:15 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2596.755512][T17409] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:15 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x7ffffffffffff}}}], 0xffffff76) 22:57:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000036f}, 0x28) [ 2597.056929][T17383] IPVS: ftp: loaded support on port[0] = 21 [ 2597.864210][T17383] chnl_net:caif_netlink_parms(): no params data found [ 2597.895967][T17383] bridge0: port 1(bridge_slave_0) entered blocking state [ 2597.903518][T17383] bridge0: port 1(bridge_slave_0) entered disabled state [ 2597.911233][T17383] device bridge_slave_0 entered promiscuous mode [ 2597.919169][T17383] bridge0: port 2(bridge_slave_1) entered blocking state [ 2597.926364][T17383] bridge0: port 2(bridge_slave_1) entered disabled state [ 2597.934746][T17383] device bridge_slave_1 entered promiscuous mode [ 2598.094835][T17383] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2598.105263][T17383] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2598.127953][T17383] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2598.136725][T17383] team0: Port device team_slave_0 added [ 2598.281242][T17383] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2598.289750][T17383] team0: Port device team_slave_1 added [ 2598.296085][T17383] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2598.446360][T17383] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2598.495054][T17383] device hsr_slave_0 entered promiscuous mode [ 2598.543560][T17383] device hsr_slave_1 entered promiscuous mode [ 2598.730952][T17383] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2598.738891][T17383] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2598.761765][T17383] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2598.940155][T17383] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2598.947857][ T7] device bridge_slave_1 left promiscuous mode [ 2598.954271][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 2598.984384][ T7] device bridge_slave_0 left promiscuous mode [ 2598.990518][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 2602.996192][ T7] device hsr_slave_1 left promiscuous mode [ 2603.067396][ T7] device hsr_slave_0 left promiscuous mode [ 2603.106640][ T7] team0 (unregistering): Port device team_slave_1 removed [ 2603.122424][ T7] team0 (unregistering): Port device team_slave_0 removed [ 2603.132954][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2603.187058][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2603.289880][ T7] bond0 (unregistering): Released all slaves [ 2603.408013][T17383] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2603.421643][T17383] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2603.428597][T28041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2603.436809][T28041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2603.446866][T17383] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2603.454036][T17383] 8021q: adding VLAN 0 to HW filter on device team0 [ 2603.462832][T17383] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2603.470635][T31614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2603.479174][T31614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2603.487989][T31614] bridge0: port 1(bridge_slave_0) entered blocking state [ 2603.495142][T31614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2603.504900][T27535] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2603.514463][T17383] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2603.525707][T19407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2603.534753][T19407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2603.543216][T19407] bridge0: port 2(bridge_slave_1) entered blocking state [ 2603.550285][T19407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2603.560630][T17383] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2603.574709][T28041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2603.589682][T17383] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2603.600298][T28041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2603.611957][T17383] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2603.620377][T26714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2603.629074][T26714] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2603.637819][T26714] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2603.648914][T17383] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2603.657253][T31614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2603.658028][T31614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2603.676789][T17383] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2603.684602][T31614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2603.693049][T31614] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2603.745998][T17383] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2603.753699][T19407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2603.762186][T19407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2603.773298][T17383] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2603.780049][T17383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2603.797739][T17383] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2603.811176][T17383] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2603.920045][T17432] IPVS: Scheduler module ip_vs_ú” not found 22:57:22 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f00000003c0)={0x6d, @multicast2, 0x4e24, 0x0, 'nq\x00', 0x10, 0x20, 0x76}, 0x2c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000400), &(0x7f0000000480)=0x4) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x57) 22:57:22 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000370}, 0x28) 22:57:22 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x10000000000000}}}], 0xffffff76) 22:57:22 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2603.966810][T17436] IPVS: Scheduler module ip_vs_ú” not found [ 2604.037948][T17442] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x20000298) 22:57:22 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000371}, 0x28) 22:57:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x88040, 0x0) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f00000000c0)=0x8, 0x4) [ 2604.245546][T17454] IPVS: Scheduler module ip_vs_ú” not found [ 2604.278941][T17465] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:22 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000003c0)=0xa8, &(0x7f0000000400)=0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x2, 0x71, 0xffffffffffffffff, 0x0) keyctl$read(0x11, 0xfffffffffffffffd, &(0x7f0000000000)=""/4, 0x4) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet(0x2, 0x13, 0x81) accept4$netrom(r0, &(0x7f0000000480)={{0x3, @bcast}, [@rose, @netrom, @null, @bcast, @default, @null, @null, @bcast]}, &(0x7f0000000500)=0x48, 0x80800) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r5, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 22:57:23 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000372}, 0x28) 22:57:23 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000000c0)="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") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x400) 22:57:23 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000003c0)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2604.595055][T17486] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000373}, 0x28) [ 2604.816886][T17494] IPVS: Scheduler module ip_vs_ú” not found 22:57:23 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x100000000000000}}}], 0xffffff76) 22:57:23 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:23 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0xffffffffffffff57) socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:23 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) writev(r5, &(0x7f0000000340)=[{&(0x7f0000000100)="06", 0x1}], 0x1) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x353b, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0xb, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000400)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000374}, 0x28) 22:57:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2001, 0x0) sendmsg$rds(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/249, 0xf9}, {&(0x7f00000001c0)=""/33, 0x21}, {&(0x7f00000002c0)=""/206, 0xce}, {&(0x7f00000003c0)=""/183, 0xb7}, {&(0x7f0000000480)=""/201, 0xc9}, {&(0x7f0000000580)=""/91, 0x5b}], 0x6, &(0x7f0000000200)=[@rdma_dest={0x18, 0x114, 0x2, {0x80000001, 0x3}}], 0x18, 0x20000040}, 0x24040050) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r1, &(0x7f00000006c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) [ 2605.202303][T17510] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2605.221862][T17512] IPVS: Scheduler module ip_vs_ú” not found 22:57:23 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000375}, 0x28) 22:57:24 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f00000003c0), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x10}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2605.456371][T17537] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x400, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48800}, 0x8010) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000376}, 0x28) [ 2605.640551][T17539] IPVS: Scheduler module ip_vs_ú” not found 22:57:24 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x200000000000000}}}], 0xffffff76) 22:57:24 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:24 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e24, @multicast1}}) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = socket$netlink(0x10, 0x3, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3010014}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x800, 0x70bd28, 0x25dfdbfd, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0xffffffffffffffe0}}, [""]}, 0x24}}, 0x80) 22:57:24 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x3, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x200, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x2853, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0xd, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x401) truncate(0x0, 0x0) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) r6 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000500)={{0x9, 0x5, 0x1, 0x203, 'syz0\x00', 0x40}, 0x5, 0x9, 0x8611, r6, 0x9, 0x6, 'syz0\x00', &(0x7f0000000480)=['\xfa\x94\x00', 'self,$:wlan1/wlan1\x06', 'vmnet0$ppp1vboxnet0lo\x00', 'ah\x00', '\xfa\x94\x00', '\x00', 'wlan0user\x00', 'ah\x00', '\xfa\x94\x00'], 0x43, [], [0x4, 0x7f, 0x5, 0xffffffffffff37cc]}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e20, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000003c0)={0x9, 0x80, 0x7, 0x2, 0x3}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f0000000400)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x10}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r7 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r7, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000377}, 0x28) [ 2606.347425][T17567] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x400, 0x2) accept$unix(r1, 0x0, &(0x7f00000000c0)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x41c, r2, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x66}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x100, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x29}}, 0x6}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x2, @mcast1, 0x7cf5}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10001}]}, @TIPC_NLA_LINK={0xec, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x25800000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ac6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x576b4498}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1daee}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbe}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'gretap0\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth1_to_team\x00'}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe6}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'hwsim0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'sit0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000001}]}, @TIPC_NLA_BEARER={0x84, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfcc5}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e20, @rand_addr=0x3}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xcb}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc6}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x10000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffffffc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xe6}]}, @TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ce}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x647}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}]}, 0x41c}, 0x1, 0x0, 0x0, 0x8ed822f0306a680b}, 0x4) [ 2606.465978][T17575] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 22:57:25 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:25 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x300000000000000}}}], 0xffffff76) 22:57:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x88, 0x200000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0x2f, "bb9c904108b6fa82473d052fcd0f907879e0285d536d6411b04618b42b2c358e5d75bb60b391eed71499c0da3831f7"}, &(0x7f0000000140)=0x37) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r2, 0x800}, &(0x7f00000001c0)=0x8) [ 2606.540045][T17564] IPVS: Scheduler module ip_vs_ú” not found 22:57:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000378}, 0x28) [ 2606.635335][T17586] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/ip_vs\x00') setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000040)=0x4088, 0x4) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r2 = semget(0x1, 0x0, 0x410) semtimedop(r2, &(0x7f0000000000)=[{0x1, 0x42, 0x800}, {0x3, 0x20, 0x800}], 0x2, &(0x7f0000000080)={0x0, 0x989680}) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes)\x00'}, 0x58) 22:57:25 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2606.972498][T17601] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:26 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000379}, 0x28) 22:57:26 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000480)={0x0, 0x0, 0x3, 0x0, [], [{0x78, 0x80000001, 0x1, 0x4, 0x70, 0xc7}, {0x7fffffff, 0xffffffffffff1e30, 0x4, 0xe, 0x9, 0x100000000}], [[], [], []]}) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:26 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\a\xff\xff', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup3(r0, r0, 0x80000) sendmsg$nl_crypto(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=@alg={0x110, 0x10, 0xf59ef4ab2af1b492, 0x70bd2c, 0x25dfdbfd, {{'rmd256-generic\x00'}, [], [], 0x400, 0x2000}, [{0x8}, {0x8, 0x1, 0xfffffffffffffffc}, {0x8, 0x1, 0xe3}, {0x8, 0x1, 0x849}, {0x8, 0x1, 0x8}, {0x8, 0x1, 0x9}]}, 0x110}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000000) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:26 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x600000000000000}}}], 0xffffff76) [ 2607.538663][T17618] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2607.595350][T17614] IPVS: Scheduler module ip_vs_ú” not found 22:57:26 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) bind$llc(r0, &(0x7f00000003c0)={0x1a, 0x17, 0x1, 0x8, 0x992, 0x80000000, @broadcast}, 0x10) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:26 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\xff\xff\xff', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0xfffffffffffffff3) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) ioctl$SIOCNRDECOBS(r1, 0x89e2) 22:57:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000037a}, 0x28) [ 2607.829250][T17637] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0xfffffffffffffffb}, &(0x7f0000000100)=0x120) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000140)={r2, 0x6f, "f9e76f962ea848c05e57ef10daff667bae7b750851c8c2990e714e6af603c6f7420b304c4026e7d9f49dc952131c5893410515b9a63f95e0b9f7bba3d5597d00972dcbb54d1fa8f2d2756d4ac494490cfd4fa24bff5e85b43a27f75c895bcb6123f98c37b765c7450c95b26af0895b"}, &(0x7f00000001c0)=0x77) [ 2607.895373][T17641] IPVS: Scheduler module ip_vs_ú” not found 22:57:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000037b}, 0x28) 22:57:27 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:27 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x02\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:27 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x1000, 0x8, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x10, 0x1) write$binfmt_elf64(r4, &(0x7f00000005c0)=ANY=[], 0x2a5) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x6c, r5, 0x8, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x410}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x504}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x800}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25d}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x14) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512\x00'}, 0x242) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) 22:57:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000037c}, 0x28) 22:57:27 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x800000000000000}}}], 0xffffff76) [ 2608.484713][T17666] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:27 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000540)={@mcast1, 0x44, r5}) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x48000, 0x0) connect$bt_l2cap(r1, &(0x7f00000000c0)={0x1f, 0x9, {0xfff, 0x100, 0x2, 0x1000, 0x7}, 0xffffffff, 0x67}, 0xe) 22:57:27 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x03\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2608.568811][T17668] IPVS: Scheduler module ip_vs_ú” not found 22:57:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000037d}, 0x28) 22:57:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x2a0) dup2(r0, r0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xb20, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x1, 0x5}, 0x0, 0xfffffffffffffffe, 'id1\x00', 'timer0\x00', 0x0, 0x5, 0x401, 0x0, 0x4}) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) connect$rose(r1, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) [ 2608.800236][T17694] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2608.842836][T17693] IPVS: Scheduler module ip_vs_ú” not found 22:57:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000037e}, 0x28) 22:57:27 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:27 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x04\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) io_setup(0x7ef2, &(0x7f0000000000)=0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000300)={'veth0_to_bridge\x00', 0x1}) io_getevents(r1, 0x5, 0x28b, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r2 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffb97, 0x480840) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f00000002c0)={0x0, 0x4, 0x3, 0xa0, &(0x7f0000ff9000/0x4000)=nil, 0x80}) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000037f}, 0x28) 22:57:27 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r5, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r5, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:27 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0xc00000000000000}}}], 0xffffff76) [ 2609.369312][T17721] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:28 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x05\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2609.423747][T17719] IPVS: Scheduler module ip_vs_ú” not found 22:57:28 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f00000003c0)={0x200, 'syz0\x00'}) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000400)=0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x3, 0x8, 0x200, 0x7, 0x0, 0x7b7f9189, 0x8, 0x2, 0xdce7, 0x2, 0x1, 0x6, 0x3, 0x6, 0x8, 0x739, 0x1, 0x3, 0x7, 0x9, 0x2, 0x400, 0x80000001, 0x5, 0x1445977c, 0x4, 0x3b3f, 0x100000001, 0x0, 0x7f, 0xff, 0x20, 0x7, 0xfffffffffffffffd, 0x8, 0x9b, 0x0, 0x4, 0x2, @perf_config_ext={0x0, 0x2}, 0x800, 0x7, 0x7fff, 0x0, 0xfffffffffffffc00, 0x101}, r5, 0x7, r2, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r6 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2609.534461][T17734] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000380}, 0x28) 22:57:28 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x06\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:28 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000100)={0x1, 0x4, 0x1, 0x100000000}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x3, @mcast2, 0x100000000}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000002c0)={r3, 0x196e2113, 0x7, 0x3, 0x4, 0x5}, 0x14) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000300)={0x80000000, 0x1, 0x4, 'queue1\x00', 0x3}) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) [ 2609.762552][T17739] IPVS: Scheduler module ip_vs_ú” not found 22:57:28 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x1ffffffffb) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() write$FUSE_ATTR(r1, &(0x7f0000000500)={0x78, 0x0, 0x5, {0x3, 0xfffffffffffffeff, 0x0, {0x6, 0xea4, 0x80, 0x2, 0xc58, 0x1, 0x3ff, 0x5, 0x100000000, 0x7ff, 0x0, r5, r6, 0xdec, 0x555}}}, 0x78) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x81d, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r7 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r7, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000381}, 0x28) [ 2609.829974][T17750] Unknown ioctl -1064545482 [ 2609.847920][T17751] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2609.859121][T17750] Unknown ioctl -1064545482 22:57:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x40) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000100)) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0xc0800) setsockopt$inet_int(r1, 0x0, 0x1f, &(0x7f0000000140)=0x3ffc000, 0x4) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x19) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:28 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\a\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2610.083482][T17761] IPVS: Scheduler module ip_vs_ú” not found 22:57:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000382}, 0x28) [ 2610.126897][T17772] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:28 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x1000000000000000}}}], 0xffffff76) 22:57:28 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x5, 0xd3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) write$FUSE_IOCTL(r1, &(0x7f00000000c0)={0x20, 0x0, 0x7, {0xffffffffffffff6a, 0x0, 0x5, 0x80000000}}, 0x20) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:28 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x11\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000383}, 0x28) [ 2610.389299][T17783] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2610.495419][T17784] IPVS: Scheduler module ip_vs_ú” not found 22:57:29 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:29 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00H\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000340)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r1, 0x6}}, 0x18) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) write$binfmt_elf32(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0xa4f) r2 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14, 0x800) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000400)={0x1ff, 0x5, 0x2000}, 0x4) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x200, 0xc480) syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) accept4(r0, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000140)=0x80, 0x800) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) getsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000440)={@loopback, @dev, @remote}, &(0x7f0000000480)=0xc) 22:57:29 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x7, 0x100000002) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000003, &(0x7f00000003c0)=0x203, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000900)=@nat={'nat\x00', 0x1b, 0x5, 0x6d8, 0x110, 0x0, 0x4f8, 0x110, 0x110, 0x608, 0x608, 0x608, 0x608, 0x608, 0x5, &(0x7f0000000480), {[{{@ipv6={@loopback, @ipv4={[], [], @broadcast}, [0xff, 0xff000000, 0xffffffff, 0xffffff00], [0xff000000, 0xff000000, 0xffffffff, 0xffffff00], 'caif0\x00', 'vcan0\x00', {0xff}, {}, 0x3a, 0x0, 0x7, 0x48}, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0xa, @ipv4=@multicast1, @ipv4=@local, @gre_key=0x40, @gre_key}}}, {{@ipv6={@loopback, @ipv4={[], [], @multicast1}, [0x78339ae82e5967cc, 0xff000000, 0xffffffff, 0xff000000], [0xff0000ff, 0xffffff00, 0xffffffff, 0xffffff00], 'syz_tun\x00', 'team0\x00', {0xff}, {0xff}, 0x3f, 0x8, 0x0, 0x58}, 0x0, 0x158, 0x1a0, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x7, 0x2, 0x1, [0x9, 0x5, 0x1, 0x400000000000000, 0x0, 0xb381, 0xfffffffffffffff7, 0x4, 0x328, 0x8, 0x7, 0x100, 0x9, 0x4, 0x40, 0x2], 0x9}}, @common=@dst={0x48, 'dst\x00', 0x0, {0x6, 0x2, 0x1, [0x200, 0xfffffffffffffc8a, 0x800, 0x2, 0x101, 0x101, 0x80, 0x50cf, 0x1, 0x7, 0x3, 0x5, 0x1, 0x6, 0x2, 0x3ff], 0x4}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x1c, @ipv6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv6=@empty, @icmp_id=0x65, @icmp_id=0x66}}}, {{@uncond, 0x0, 0x200, 0x248, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x1, 0x1f, 0xad8, 0xfff, 0x8, 0x3, [@mcast1, @local, @mcast1, @local, @local, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @rand_addr="0430296ac56eef94451d54cf99508a14", @rand_addr="965597b60547a12edd75a7139d58277d", @ipv4={[], [], @multicast2}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0xa}, @loopback, @dev={0xfe, 0x80, [], 0xd}, @local, @empty, @mcast1], 0xa}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x10, @ipv6=@mcast1, @ipv6=@mcast1, @icmp_id=0x64, @port=0x4e21}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0xe, @ipv6=@loopback, @ipv4=@local, @port=0x4e21, @icmp_id=0x64}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x738) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000384}, 0x28) [ 2610.950381][T17807] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:29 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00L\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160-generic\x00'}, 0x28) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000385}, 0x28) 22:57:29 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x3f00000000000000}}}], 0xffffff76) [ 2611.255069][T17835] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @remote}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)=0x0) r3 = getegid() lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x2, r1}], {0x4, 0x6}, [{0x8, 0x2, r2}, {0x8, 0x4, r3}], {0x10, 0x1}, {0x20, 0x1}}, 0x3c, 0x2) 22:57:30 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000140)={'ah\x00'}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(0x0, 0x0) clone(0x101ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, '\xfa\x94\x00'}, 0x2c) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x0, 0x3ff, 0xffffffffffffffff, {0x0, 0x1c9c380}, 0x9, 0x80000001}) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r5 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000386}, 0x28) [ 2611.645710][T17848] IPVS: Scheduler module ip_vs_ú” not found 22:57:30 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = epoll_create1(0x80000) poll(&(0x7f00000000c0)=[{r0, 0x4000}, {r1, 0x10}, {r0, 0x4123}, {r0, 0x2}, {r0, 0x200}], 0x5, 0x4) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$CAPI_INSTALLED(r2, 0x80024322) 22:57:30 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00`\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000384}, 0x28) 22:57:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000387}, 0x28) 22:57:30 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x7fffffffffffffff}}}], 0xffffff76) 22:57:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000037e}, 0x28) [ 2611.922363][T17863] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:30 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00h\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(lrw(serpent),rmd160)\x00'}, 0x58) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000140)=0xf239) write$P9_RCREATE(r1, &(0x7f00000000c0)={0x18, 0x73, 0x2, {{0x42, 0x3, 0x7}, 0x476}}, 0x18) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000100)={0x87, @loopback, 0x4e22, 0x3, 'ovf\x00', 0x20, 0xffff, 0x57}, 0x2c) 22:57:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000388}, 0x28) 22:57:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000037c}, 0x28) [ 2612.145444][T17877] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:30 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00l\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2612.250900][T17889] Unknown ioctl 8705 [ 2612.313744][T17889] Unknown ioctl 8705 [ 2612.381495][T17901] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000389}, 0x28) 22:57:31 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:31 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x84000, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f00000000c0)={0x5, 0x5}) 22:57:31 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00t\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:31 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0x8000000000000000}}}], 0xffffff76) 22:57:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x121203) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x956e, 0x800}, &(0x7f0000000100)=0x18) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000240)={@remote={[], 0x3}, 0x3, 'caif0\x00'}) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x6}, &(0x7f0000000180)=0x8) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) [ 2613.029377][T17915] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:31 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00z\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000038a}, 0x28) 22:57:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) [ 2613.266758][T17933] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:32 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x88\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000038b}, 0x28) 22:57:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f00000000c0)=0x89) [ 2613.632816][T17947] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:32 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:32 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0xfeffffff00000000}}}], 0xffffff76) 22:57:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000038c}, 0x28) 22:57:32 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:32 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x03\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2614.175293][T17967] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000180)={0xf000, 0x10000}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40000, 0x0) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f00000000c0)=0x1, &(0x7f0000000100)=0x4) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000140)=0x2, 0x4) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000038d}, 0x28) 22:57:32 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x05\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) [ 2614.440383][T17982] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000038e}, 0x28) 22:57:33 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x06\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2614.679672][T17992] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:33 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) 22:57:33 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0xffffffff00000000}}}], 0xffffff76) 22:57:33 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\a\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2615.190611][T18011] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:33 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x11\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff0000038f}, 0x28) 22:57:33 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @remote}], 0x10) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) flock(r1, 0x1) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685) pipe(&(0x7f0000000100)) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) 22:57:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x40, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000140)=""/55, &(0x7f0000000180)=0x37) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f00000000c0)=0xc) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'ipddp0\x00', 0x8000}) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f00000002c0)={0xd, 0x2, 0x2, 0x847fc, r1}) [ 2615.369290][T18022] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000390}, 0x28) 22:57:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) accept4$tipc(r1, 0x0, &(0x7f00000000c0), 0x80800) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:34 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00 \x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2615.671762][T18041] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:34 executing program 4 (fault-call:9 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:57:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) [ 2615.942592][T18051] FAULT_INJECTION: forcing a failure. [ 2615.942592][T18051] name failslab, interval 1, probability 0, space 0, times 0 [ 2615.976062][T18051] CPU: 0 PID: 18051 Comm: syz-executor4 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2615.985134][T18051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2615.995192][T18051] Call Trace: [ 2615.998505][T18051] dump_stack+0x1db/0x2d0 [ 2616.002871][T18051] ? dump_stack_print_info.cold+0x20/0x20 [ 2616.008645][T18051] ? add_lock_to_list.isra.0+0x450/0x450 [ 2616.014295][T18051] ? kasan_check_read+0x11/0x20 [ 2616.019165][T18051] should_fail.cold+0xa/0x14 [ 2616.023769][T18051] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2616.029606][T18051] ? ___might_sleep+0x1e7/0x310 [ 2616.034499][T18051] ? arch_local_save_flags+0x50/0x50 [ 2616.039795][T18051] ? lock_acquire+0x1db/0x570 [ 2616.039816][T18051] ? _raw_spin_unlock_irq+0x28/0x90 [ 2616.039836][T18051] __should_failslab+0x121/0x190 [ 2616.039870][T18051] should_failslab+0x9/0x14 [ 2616.049896][T18051] kmem_cache_alloc_node+0x265/0x710 [ 2616.049910][T18051] ? print_usage_bug+0xd0/0xd0 [ 2616.050004][T18051] copy_process+0x4088/0x8740 [ 2616.074058][T18051] ? print_usage_bug+0xd0/0xd0 [ 2616.078830][T18051] ? __lock_acquire+0x572/0x4a10 [ 2616.083764][T18051] ? process_measurement+0x268/0x1be0 [ 2616.089124][T18051] ? print_usage_bug+0xd0/0xd0 [ 2616.093878][T18051] ? __lock_acquire+0x572/0x4a10 [ 2616.098815][T18051] ? __lock_acquire+0x572/0x4a10 [ 2616.103765][T18051] ? __cleanup_sighand+0x70/0x70 [ 2616.108688][T18051] ? mark_held_locks+0x100/0x100 [ 2616.113624][T18051] ? __lock_acquire+0x572/0x4a10 [ 2616.118551][T18051] ? mark_held_locks+0x100/0x100 [ 2616.123476][T18051] ? __might_fault+0x12b/0x1e0 [ 2616.128234][T18051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2616.134472][T18051] ? _parse_integer+0x139/0x190 [ 2616.139312][T18051] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2616.145533][T18051] ? _kstrtoull+0x17d/0x250 [ 2616.150020][T18051] ? add_lock_to_list.isra.0+0x450/0x450 [ 2616.155668][T18051] ? lock_downgrade+0xbe0/0xbe0 [ 2616.160498][T18051] ? add_lock_to_list.isra.0+0x450/0x450 [ 2616.166114][T18051] ? __check_object_size+0xa3/0x790 [ 2616.171302][T18051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2616.177622][T18051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2616.183846][T18051] ? check_preemption_disabled+0x48/0x290 [ 2616.189560][T18051] ? get_pid_task+0xd4/0x190 [ 2616.194136][T18051] ? find_held_lock+0x35/0x120 [ 2616.198898][T18051] ? get_pid_task+0xd4/0x190 [ 2616.203531][T18051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2616.209794][T18051] ? add_lock_to_list.isra.0+0x450/0x450 [ 2616.215453][T18051] ? kasan_check_read+0x11/0x20 [ 2616.220345][T18051] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2616.226310][T18051] ? rcu_read_unlock_special+0x380/0x380 [ 2616.231929][T18051] ? __f_unlock_pos+0x19/0x20 [ 2616.236605][T18051] ? find_held_lock+0x35/0x120 [ 2616.241379][T18051] ? __f_unlock_pos+0x19/0x20 [ 2616.246044][T18051] ? proc_fail_nth_write+0xa0/0x220 [ 2616.251228][T18051] ? lock_downgrade+0xbe0/0xbe0 [ 2616.256064][T18051] ? vfs_write+0x2f0/0x580 [ 2616.260494][T18051] ? kasan_check_write+0x14/0x20 [ 2616.265471][T18051] ? __mutex_unlock_slowpath+0x195/0x870 [ 2616.271151][T18051] _do_fork+0x1a9/0x1170 [ 2616.275418][T18051] ? fork_idle+0x1d0/0x1d0 [ 2616.279844][T18051] ? __sb_end_write+0xd9/0x110 [ 2616.284642][T18051] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2616.290925][T18051] ? fput+0x128/0x1a0 [ 2616.294939][T18051] ? do_syscall_64+0x8c/0x800 [ 2616.299625][T18051] ? do_syscall_64+0x8c/0x800 [ 2616.304310][T18051] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2616.309646][T18051] ? trace_hardirqs_on+0xbd/0x310 [ 2616.314714][T18051] ? __ia32_sys_read+0xb0/0xb0 [ 2616.319486][T18051] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2616.325579][T18051] ? trace_hardirqs_off_caller+0x300/0x300 [ 2616.331423][T18051] __x64_sys_clone+0xbf/0x150 [ 2616.336113][T18051] do_syscall_64+0x1a3/0x800 [ 2616.340733][T18051] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2616.346375][T18051] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2616.352105][T18051] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2616.357673][T18051] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2616.363598][T18051] RIP: 0033:0x457ec9 [ 2616.367495][T18051] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:57:35 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0xffffffffffff0700}}}], 0xffffff76) 22:57:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000391}, 0x28) 22:57:35 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00?\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20000, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x8, 0x40000) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) [ 2616.387139][T18051] RSP: 002b:00007f064b45dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2616.395568][T18051] RAX: ffffffffffffffda RBX: 00007f064b45dc90 RCX: 0000000000457ec9 [ 2616.403543][T18051] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2616.411531][T18051] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2616.419516][T18051] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f064b45e6d4 [ 2616.427487][T18051] R13: 00000000004be2a0 R14: 00000000004ce760 R15: 0000000000000007 22:57:35 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2616.492916][T18058] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:35 executing program 3: syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0xc) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000040), 0x4) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x138) 22:57:35 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00H\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000392}, 0x28) 22:57:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0xffffffffffffffd4) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) [ 2616.660264][T18071] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:35 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00L\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:35 executing program 4 (fault-call:9 fault-nth:1): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) 22:57:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup3(r0, r0, 0x0) bind$rxrpc(r1, &(0x7f00000012c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e20, 0x3, @mcast2, 0x7f}}, 0x24) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000100)=0x5, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001480)=0x8) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80000, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f00000002c0)="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") r4 = getuid() getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000001400)) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x280000, &(0x7f00000014c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',afid=0x0000000000000009,access=', @ANYRESDEC=r4, @ANYBLOB="2c63616368653d6d6d61702c636f6e746578743d756e636f6e66696e65645f752c6d6561737572652c736d61636b6673666c6f6f723d68617368002c736d61636b6673726f6f743d242c657569643dc5", @ANYRESDEC=r5, @ANYBLOB=',\x00']) [ 2616.891304][T18087] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2616.949070][T18091] FAULT_INJECTION: forcing a failure. [ 2616.949070][T18091] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2616.976170][T18091] CPU: 0 PID: 18091 Comm: syz-executor4 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2616.985209][T18091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2616.995283][T18091] Call Trace: [ 2616.998615][T18091] dump_stack+0x1db/0x2d0 [ 2617.002970][T18091] ? dump_stack_print_info.cold+0x20/0x20 [ 2617.008722][T18091] should_fail.cold+0xa/0x14 [ 2617.013339][T18091] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2617.019184][T18091] ? arch_local_save_flags+0x50/0x50 [ 2617.024518][T18091] ? lock_release+0xc40/0xc40 [ 2617.029224][T18091] should_fail_alloc_page+0x50/0x60 [ 2617.029249][T18091] __alloc_pages_nodemask+0x323/0xdc0 [ 2617.039844][T18091] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 2617.039869][T18091] ? rcu_pm_notify+0xd0/0xd0 [ 2617.039898][T18091] ? rcu_read_lock_sched_held+0x110/0x130 [ 2617.039916][T18091] ? kmem_cache_alloc_node+0x347/0x710 [ 2617.039935][T18091] ? print_usage_bug+0xd0/0xd0 [ 2617.066209][T18091] copy_process+0x847/0x8740 [ 2617.070800][T18091] ? print_usage_bug+0xd0/0xd0 [ 2617.075571][T18091] ? __lock_acquire+0x572/0x4a10 [ 2617.080521][T18091] ? process_measurement+0x268/0x1be0 [ 2617.085903][T18091] ? print_usage_bug+0xd0/0xd0 [ 2617.085923][T18091] ? __lock_acquire+0x572/0x4a10 [ 2617.085939][T18091] ? __lock_acquire+0x572/0x4a10 [ 2617.085968][T18091] ? __cleanup_sighand+0x70/0x70 [ 2617.100564][T18091] ? mark_held_locks+0x100/0x100 [ 2617.100586][T18091] ? __lock_acquire+0x572/0x4a10 [ 2617.100616][T18091] ? mark_held_locks+0x100/0x100 [ 2617.120334][T18091] ? __might_fault+0x12b/0x1e0 [ 2617.125126][T18091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2617.131377][T18091] ? _parse_integer+0x139/0x190 [ 2617.136243][T18091] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2617.142479][T18091] ? _kstrtoull+0x17d/0x250 [ 2617.146965][T18091] ? add_lock_to_list.isra.0+0x450/0x450 [ 2617.152579][T18091] ? lock_downgrade+0xbe0/0xbe0 [ 2617.157413][T18091] ? add_lock_to_list.isra.0+0x450/0x450 [ 2617.163028][T18091] ? __check_object_size+0xa3/0x790 [ 2617.168234][T18091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2617.174453][T18091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2617.180686][T18091] ? check_preemption_disabled+0x48/0x290 [ 2617.186514][T18091] ? get_pid_task+0xd4/0x190 [ 2617.191097][T18091] ? find_held_lock+0x35/0x120 [ 2617.195849][T18091] ? get_pid_task+0xd4/0x190 [ 2617.200435][T18091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2617.206657][T18091] ? add_lock_to_list.isra.0+0x450/0x450 [ 2617.212294][T18091] ? kasan_check_read+0x11/0x20 [ 2617.217133][T18091] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2617.223106][T18091] ? rcu_read_unlock_special+0x380/0x380 [ 2617.228777][T18091] ? __f_unlock_pos+0x19/0x20 [ 2617.233562][T18091] ? find_held_lock+0x35/0x120 [ 2617.238308][T18091] ? __f_unlock_pos+0x19/0x20 [ 2617.242986][T18091] ? proc_fail_nth_write+0xa0/0x220 [ 2617.248180][T18091] ? lock_downgrade+0xbe0/0xbe0 [ 2617.253030][T18091] ? vfs_write+0x2f0/0x580 [ 2617.257441][T18091] ? kasan_check_write+0x14/0x20 [ 2617.262363][T18091] ? __mutex_unlock_slowpath+0x195/0x870 [ 2617.267982][T18091] _do_fork+0x1a9/0x1170 [ 2617.272218][T18091] ? fork_idle+0x1d0/0x1d0 [ 2617.276617][T18091] ? __sb_end_write+0xd9/0x110 [ 2617.281409][T18091] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2617.287635][T18091] ? fput+0x128/0x1a0 [ 2617.291632][T18091] ? do_syscall_64+0x8c/0x800 [ 2617.296307][T18091] ? do_syscall_64+0x8c/0x800 [ 2617.300969][T18091] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2617.306233][T18091] ? trace_hardirqs_on+0xbd/0x310 [ 2617.311244][T18091] ? __ia32_sys_read+0xb0/0xb0 [ 2617.316007][T18091] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2617.322071][T18091] ? trace_hardirqs_off_caller+0x300/0x300 [ 2617.327886][T18091] __x64_sys_clone+0xbf/0x150 [ 2617.332548][T18091] do_syscall_64+0x1a3/0x800 [ 2617.337128][T18091] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2617.342747][T18091] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2617.348450][T18091] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2617.353980][T18091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2617.359847][T18091] RIP: 0033:0x457ec9 [ 2617.363728][T18091] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2617.383318][T18091] RSP: 002b:00007f064b45dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2617.391736][T18091] RAX: ffffffffffffffda RBX: 00007f064b45dc90 RCX: 0000000000457ec9 [ 2617.399687][T18091] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2617.407638][T18091] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2617.415621][T18091] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f064b45e6d4 [ 2617.423581][T18091] R13: 00000000004be2a0 R14: 00000000004ce760 R15: 0000000000000007 22:57:36 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{0x0, 0xffffffffffffff7f}}}], 0xffffff76) 22:57:36 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00`\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = socket$inet6(0xa, 0xa, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000002c0)=@nat={'nat\x00', 0x1b, 0x5, 0x5d0, 0x0, 0x270, 0x270, 0x3f0, 0x110, 0x500, 0x500, 0x500, 0x500, 0x500, 0x5, &(0x7f00000000c0), {[{{@uncond, 0x0, 0xc8, 0x110}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x2, @ipv4=@dev={0xac, 0x14, 0x14, 0x11}, @ipv6=@empty, @port=0x4e24, @gre_key=0x8}}}, {{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xf, 0x8, 0x3, 0x1}}, @common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xf, 0xb0, 0x401}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x4, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@loopback, @icmp_id=0x68, @gre_key=0x3}}}, {{@ipv6={@empty, @mcast2, [0xff000000, 0x7ddb2fcc6625eacc, 0xff0000ff], [0xff000000, 0x0, 0xff, 0xffffffff], 'bridge_slave_0\x00', 'vxcan1\x00', {0xff}, {}, 0x67, 0x3ff, 0x2, 0x24}, 0x0, 0x110, 0x180, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x3, 0x4, 0x1, [0x80000000, 0x5, 0xffff, 0x3, 0xffff, 0x7, 0x4, 0x7f, 0x4, 0xff, 0x5, 0x3f, 0xfff, 0x7fff, 0x6, 0x80000000], 0xb}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x8, 0x5, 0x1f, 0x1, 0x0, "6ed4c691863993412c91236af9fd3913d04ca6127881e0823ee50122968a1428b24e69af50167256d8ab3e8fbed830742defbfebdc9ed73d53a9b95bd7b56d99"}}}, {{@ipv6={@local, @loopback, [0xffffffff, 0xff], [0xff, 0xff000000, 0x0, 0xff], 'batadv0\x00', 'bridge_slave_0\x00', {0xff}, {0xff}, 0x67, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x2, @ipv6=@local, @ipv6=@local, @port=0x4e21, @gre_key=0x4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x630) 22:57:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000393}, 0x28) 22:57:36 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2617.602687][T18108] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:36 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00h\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:36 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1, 0x0) accept$alg(r0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0xfffffffffffffce1) 22:57:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000394}, 0x28) 22:57:36 executing program 4 (fault-call:9 fault-nth:2): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2617.787264][T18124] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2617.834447][T18124] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7fff, 0x100) accept4$packet(r1, 0x0, &(0x7f00000000c0), 0x800) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)=0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x2, 0xeb6f9a431e50a0cd) sched_rr_get_interval(r2, &(0x7f0000000140)) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-aesni-avx2\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000395}, 0x28) 22:57:36 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00l\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2617.934021][T18134] FAULT_INJECTION: forcing a failure. [ 2617.934021][T18134] name failslab, interval 1, probability 0, space 0, times 0 [ 2618.008465][T18134] CPU: 0 PID: 18134 Comm: syz-executor4 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2618.017518][T18134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2618.027573][T18134] Call Trace: [ 2618.030897][T18134] dump_stack+0x1db/0x2d0 [ 2618.035263][T18134] ? dump_stack_print_info.cold+0x20/0x20 [ 2618.041022][T18134] should_fail.cold+0xa/0x14 [ 2618.041515][T18146] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2618.045841][T18134] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2618.045876][T18134] ? ___might_sleep+0x1e7/0x310 [ 2618.045894][T18134] ? arch_local_save_flags+0x50/0x50 [ 2618.045921][T18134] __should_failslab+0x121/0x190 [ 2618.045941][T18134] should_failslab+0x9/0x14 [ 2618.045964][T18134] kmem_cache_alloc+0x2be/0x710 [ 2618.084957][T18134] ? rcu_read_lock_sched_held+0x110/0x130 [ 2618.090677][T18134] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2618.096923][T18134] prepare_creds+0xa4/0x510 [ 2618.101453][T18134] ? abort_creds+0x2c0/0x2c0 [ 2618.106049][T18134] ? copy_process+0xb3c/0x8740 [ 2618.110814][T18134] ? trace_hardirqs_off_caller+0x300/0x300 [ 2618.116612][T18134] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2618.122845][T18134] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2618.129122][T18134] ? check_preemption_disabled+0x48/0x290 [ 2618.134978][T18134] copy_creds+0x7b/0x6c0 [ 2618.139224][T18134] copy_process+0x114d/0x8740 [ 2618.143903][T18134] ? print_usage_bug+0xd0/0xd0 [ 2618.148664][T18134] ? __lock_acquire+0x572/0x4a10 [ 2618.153603][T18134] ? process_measurement+0x268/0x1be0 [ 2618.159003][T18134] ? print_usage_bug+0xd0/0xd0 [ 2618.163825][T18134] ? __lock_acquire+0x572/0x4a10 [ 2618.168812][T18134] ? __lock_acquire+0x572/0x4a10 [ 2618.173783][T18134] ? __cleanup_sighand+0x70/0x70 [ 2618.178892][T18134] ? mark_held_locks+0x100/0x100 [ 2618.183849][T18134] ? __lock_acquire+0x572/0x4a10 [ 2618.188828][T18134] ? mark_held_locks+0x100/0x100 [ 2618.193779][T18134] ? __might_fault+0x12b/0x1e0 [ 2618.198547][T18134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2618.204782][T18134] ? _parse_integer+0x139/0x190 [ 2618.209635][T18134] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2618.215910][T18134] ? _kstrtoull+0x17d/0x250 [ 2618.220424][T18134] ? add_lock_to_list.isra.0+0x450/0x450 [ 2618.226047][T18134] ? lock_downgrade+0xbe0/0xbe0 [ 2618.230897][T18134] ? add_lock_to_list.isra.0+0x450/0x450 [ 2618.236541][T18134] ? __check_object_size+0xa3/0x790 [ 2618.241830][T18134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2618.248104][T18134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2618.254353][T18134] ? check_preemption_disabled+0x48/0x290 [ 2618.260075][T18134] ? get_pid_task+0xd4/0x190 [ 2618.264668][T18134] ? find_held_lock+0x35/0x120 [ 2618.269430][T18134] ? get_pid_task+0xd4/0x190 [ 2618.274025][T18134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2618.280269][T18134] ? add_lock_to_list.isra.0+0x450/0x450 [ 2618.285902][T18134] ? kasan_check_read+0x11/0x20 [ 2618.290758][T18134] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2618.296753][T18134] ? rcu_read_unlock_special+0x380/0x380 [ 2618.302443][T18134] ? __f_unlock_pos+0x19/0x20 [ 2618.307128][T18134] ? find_held_lock+0x35/0x120 [ 2618.311917][T18134] ? __f_unlock_pos+0x19/0x20 [ 2618.316641][T18134] ? proc_fail_nth_write+0xa0/0x220 [ 2618.321877][T18134] ? lock_downgrade+0xbe0/0xbe0 [ 2618.326734][T18134] ? vfs_write+0x2f0/0x580 [ 2618.331165][T18134] ? kasan_check_write+0x14/0x20 [ 2618.336107][T18134] ? __mutex_unlock_slowpath+0x195/0x870 [ 2618.341753][T18134] _do_fork+0x1a9/0x1170 [ 2618.346017][T18134] ? fork_idle+0x1d0/0x1d0 [ 2618.350449][T18134] ? __sb_end_write+0xd9/0x110 [ 2618.355215][T18134] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2618.361469][T18134] ? fput+0x128/0x1a0 [ 2618.365448][T18134] ? do_syscall_64+0x8c/0x800 [ 2618.370123][T18134] ? do_syscall_64+0x8c/0x800 [ 2618.374798][T18134] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2618.380078][T18134] ? trace_hardirqs_on+0xbd/0x310 [ 2618.385113][T18134] ? __ia32_sys_read+0xb0/0xb0 [ 2618.389891][T18134] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2618.395961][T18134] ? trace_hardirqs_off_caller+0x300/0x300 [ 2618.401774][T18134] __x64_sys_clone+0xbf/0x150 [ 2618.406457][T18134] do_syscall_64+0x1a3/0x800 [ 2618.411047][T18134] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2618.416683][T18134] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2618.422406][T18134] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2618.427956][T18134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2618.433844][T18134] RIP: 0033:0x457ec9 [ 2618.437752][T18134] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2618.457349][T18134] RSP: 002b:00007f064b45dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2618.465792][T18134] RAX: ffffffffffffffda RBX: 00007f064b45dc90 RCX: 0000000000457ec9 [ 2618.473757][T18134] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2618.481745][T18134] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2618.489717][T18134] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f064b45e6d4 [ 2618.497683][T18134] R13: 00000000004be2a0 R14: 00000000004ce760 R15: 0000000000000007 22:57:37 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{}, {0x2}}}], 0xffffff76) 22:57:37 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00t\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:37 executing program 3: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000396}, 0x28) 22:57:37 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) 22:57:37 executing program 4 (fault-call:9 fault-nth:3): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000280)=""/100, 0x64) read(r1, &(0x7f0000000400)=""/100, 0x64) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_user='access=user'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@seclabel='seclabel'}, {@fowner_lt={'fowner<', r5}}]}}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$UI_ABS_SETUP(r6, 0x401c5504, &(0x7f0000000040)={0x400, {0x0, 0x7f, 0x1, 0x12083a1b, 0x1, 0xd1fe}}) [ 2618.853805][T18165] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm-aes-ce\x00'}, 0x58) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20400, 0x0) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) 22:57:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000397}, 0x28) 22:57:37 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00z\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2619.093273][T18186] kernel msg: ebtables bug: please report to author: Valid hook without chain 22:57:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000398}, 0x28) 22:57:37 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x88\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) [ 2619.259881][T18195] FAULT_INJECTION: forcing a failure. [ 2619.259881][T18195] name failslab, interval 1, probability 0, space 0, times 0 22:57:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x8, 0x8200) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f00000002c0)={0x3, 0x3, 0x3, {0xc, @raw_data="9c195ace256483a43fde9e289767124d5026f69420d60d11ab0b0708f2012185b9f64fef4c373259b0e467af7802f327c8e6c6bf969e0b44d41fac980b39725faad10dbf79a738e16c912935c6288108a2a271e882feaac805bc491771d1a83e9fbadb37a48f4a631ee6044ff2d5a8e7a55f80d4c67ce0fa15f27ea32db21c29b3c8db09bc820c23322ab91fe4f8bb6257ce886c88cb1ffd8e8584a422f7e1c39b54cef1f1b738605aee367e24eff28f3d37e1e05a8ba9566812033b001bb74e2fbfa1791164b6a0"}}) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f00000003c0)={0x0, {0x3f, 0x5}}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400ff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000200)={'bond_slave_0\x00', 0x800}) getsockopt$inet6_buf(r2, 0x29, 0x2c, &(0x7f00000000c0)=""/171, &(0x7f0000000180)=0xab) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) [ 2619.389544][T18204] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2619.557946][T18195] CPU: 0 PID: 18195 Comm: syz-executor4 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2619.567008][T18195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2619.577071][T18195] Call Trace: [ 2619.580377][T18195] dump_stack+0x1db/0x2d0 [ 2619.584723][T18195] ? dump_stack_print_info.cold+0x20/0x20 [ 2619.590483][T18195] ? prepare_creds+0xa4/0x510 [ 2619.595169][T18195] ? copy_creds+0x7b/0x6c0 [ 2619.595186][T18195] ? copy_process+0x114d/0x8740 [ 2619.595201][T18195] ? _do_fork+0x1a9/0x1170 [ 2619.595215][T18195] ? __x64_sys_clone+0xbf/0x150 [ 2619.595239][T18195] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2619.604524][T18195] should_fail.cold+0xa/0x14 [ 2619.604547][T18195] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2619.604570][T18195] ? ___might_sleep+0x1e7/0x310 [ 2619.604587][T18195] ? arch_local_save_flags+0x50/0x50 [ 2619.604606][T18195] ? check_preemption_disabled+0x48/0x290 [ 2619.604645][T18195] __should_failslab+0x121/0x190 [ 2619.651187][T18195] should_failslab+0x9/0x14 [ 2619.655705][T18195] __kmalloc+0x2dc/0x740 [ 2619.659959][T18195] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2619.665766][T18195] ? prepare_creds+0xa4/0x510 [ 2619.670498][T18195] ? prepare_creds+0xa4/0x510 [ 2619.675182][T18195] ? security_prepare_creds+0x123/0x190 [ 2619.680765][T18195] security_prepare_creds+0x123/0x190 [ 2619.686177][T18195] prepare_creds+0x3c4/0x510 [ 2619.690786][T18195] ? abort_creds+0x2c0/0x2c0 [ 2619.695384][T18195] ? copy_process+0xb3c/0x8740 [ 2619.700166][T18195] ? trace_hardirqs_off_caller+0x300/0x300 [ 2619.705978][T18195] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2619.712224][T18195] ? check_preemption_disabled+0x48/0x290 [ 2619.718074][T18195] copy_creds+0x7b/0x6c0 [ 2619.722351][T18195] copy_process+0x114d/0x8740 [ 2619.727029][T18195] ? print_usage_bug+0xd0/0xd0 [ 2619.731850][T18195] ? __update_load_avg_se+0xa80/0xa80 [ 2619.737242][T18195] ? __lock_acquire+0x572/0x4a10 [ 2619.742217][T18195] ? print_usage_bug+0xd0/0xd0 [ 2619.747008][T18195] ? __lock_acquire+0x572/0x4a10 [ 2619.751981][T18195] ? __lock_acquire+0x572/0x4a10 [ 2619.756942][T18195] ? __cleanup_sighand+0x70/0x70 [ 2619.761884][T18195] ? mark_held_locks+0x100/0x100 [ 2619.766826][T18195] ? __lock_acquire+0x572/0x4a10 [ 2619.771772][T18195] ? mark_held_locks+0x100/0x100 [ 2619.776711][T18195] ? __might_fault+0x12b/0x1e0 [ 2619.781485][T18195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2619.787722][T18195] ? _parse_integer+0x139/0x190 [ 2619.792575][T18195] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2619.798821][T18195] ? _kstrtoull+0x17d/0x250 [ 2619.803361][T18195] ? add_lock_to_list.isra.0+0x450/0x450 [ 2619.808990][T18195] ? lock_downgrade+0xbe0/0xbe0 [ 2619.813837][T18195] ? add_lock_to_list.isra.0+0x450/0x450 [ 2619.819477][T18195] ? __check_object_size+0xa3/0x790 [ 2619.824670][T18195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2619.830902][T18195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2619.837146][T18195] ? check_preemption_disabled+0x48/0x290 [ 2619.842875][T18195] ? get_pid_task+0xd4/0x190 [ 2619.847463][T18195] ? find_held_lock+0x35/0x120 [ 2619.852223][T18195] ? get_pid_task+0xd4/0x190 [ 2619.856901][T18195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2619.863151][T18195] ? add_lock_to_list.isra.0+0x450/0x450 [ 2619.868783][T18195] ? kasan_check_read+0x11/0x20 [ 2619.873725][T18195] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2619.879740][T18195] ? rcu_read_unlock_special+0x380/0x380 [ 2619.885377][T18195] ? __f_unlock_pos+0x19/0x20 [ 2619.890053][T18195] ? find_held_lock+0x35/0x120 [ 2619.894815][T18195] ? __f_unlock_pos+0x19/0x20 [ 2619.899500][T18195] ? proc_fail_nth_write+0xa0/0x220 [ 2619.904715][T18195] ? lock_downgrade+0xbe0/0xbe0 [ 2619.909576][T18195] ? vfs_write+0x2f0/0x580 [ 2619.914072][T18195] ? kasan_check_write+0x14/0x20 [ 2619.919011][T18195] ? __mutex_unlock_slowpath+0x195/0x870 [ 2619.924646][T18195] _do_fork+0x1a9/0x1170 [ 2619.928903][T18195] ? fork_idle+0x1d0/0x1d0 [ 2619.933318][T18195] ? __sb_end_write+0xd9/0x110 [ 2619.938081][T18195] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2619.944366][T18195] ? fput+0x128/0x1a0 [ 2619.948363][T18195] ? do_syscall_64+0x8c/0x800 [ 2619.953040][T18195] ? do_syscall_64+0x8c/0x800 [ 2619.957710][T18195] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2619.962989][T18195] ? trace_hardirqs_on+0xbd/0x310 [ 2619.968006][T18195] ? __ia32_sys_read+0xb0/0xb0 [ 2619.972790][T18195] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2619.978855][T18195] ? trace_hardirqs_off_caller+0x300/0x300 [ 2619.984720][T18195] __x64_sys_clone+0xbf/0x150 [ 2619.989423][T18195] do_syscall_64+0x1a3/0x800 [ 2619.994015][T18195] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2619.999646][T18195] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2620.005368][T18195] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2620.010922][T18195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2620.016827][T18195] RIP: 0033:0x457ec9 [ 2620.020725][T18195] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2620.040323][T18195] RSP: 002b:00007f064b43cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2620.048958][T18195] RAX: ffffffffffffffda RBX: 00007f064b43cc90 RCX: 0000000000457ec9 22:57:38 executing program 2: r0 = memfd_create(&(0x7f0000000400)='/dev/snH/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xfeffffff, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect={{}, {0x3}}}], 0xffffff76) 22:57:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000040)="2504f2ff1f002c6176c5f3343dbe", 0x0, 0xf0ffff00000399}, 0x28) 22:57:38 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x350, [0x0, 0x20000280, 0x200004d0, 0x20000848], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x805, '\x00', 'vcan0\x00', 'irlan0\x00', 'gretap0\x00\x00\x00\x00\x00\x00\x01\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x27}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1f0, 0x220}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x4}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:tmp_t:s0\x00'}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x0, 0x0, 'bridge_slave_1\x00', 'nr0\x00', 'irlan0\x00', 'teql0\x00', @remote, [], @random="a3bc5f30c7c0", [], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x3c8) 22:57:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x24b, 0x10000) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000180), 0x4) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x100) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) pselect6(0x40, &(0x7f00000001c0)={0x5, 0x6, 0x3, 0x2, 0x2, 0x401, 0x1, 0x5}, &(0x7f0000000200)={0xff, 0x3, 0x2, 0x2, 0x9acb, 0x1c000000000000, 0x8, 0x7}, &(0x7f00000002c0)={0x4, 0x4, 0x0, 0x4b76050c, 0x4, 0x7, 0x81f, 0xffff}, &(0x7f0000000300)={0x77359400}, &(0x7f0000000380)={&(0x7f0000000340)={0x101}, 0x8}) [ 2620.056927][T18195] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2620.064922][T18195] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2620.079606][T18195] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f064b43d6d4 [ 2620.087598][T18195] R13: 00000000004be2a0 R14: 00000000004ce760 R15: 0000000000000005 22:57:38 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80, 0x7, 0x42, 0x3, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x4, 0x8, 0x0, 0x0, 0x7c, 0x8, 0x2, 0x400000000000000, 0x0, 0x0, 0x8, 0x9, 0xe2, 0x9, 0x86, 0x0, 0x3, 0x6, 0x7, 0x401, 0x5, 0xc58, 0x0, 0x3, 0x8001, 0x0, 0x7, 0x6, @perf_config_ext={0x434d, 0x4}, 0x8000, 0x0, 0x0, 0x7, 0x6, 0x5}, 0xffffffffffffffff, 0x10, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000780)={{0xcab}, {}, 0xff, 0x4}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000380)={0x0, 0x9, 0x0, 0xce4e, 0x0, 0x6}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0x0, "33735aeb4accf5ff65bbb376c2a96829298c381486a37a03d4574ce0a7293060", 0x820, 0x6, 0x0, 0x4, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x122de27ec9c}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000280), 0x10, &(0x7f00000001c0)={&(0x7f00000002c0)=@can={{0x3, 0x39, 0x101, 0x100000001}, 0x3, 0x3, 0x0, 0x0, "a63ea007da57f0b8"}, 0x2c}, 0x1, 0x0, 0x0, 0x8806}, 0x20000040) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0xc0505405, &(0x7f0000000000)={{0x100000001}}) [ 2620.113341][T18221] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2620.243158][ C0] ------------[ cut here ]------------ [ 2620.248990][ C0] AppArmor WARN cred_label: ((!blob)): [ 2620.249267][ C0] WARNING: CPU: 0 PID: 18195 at security/apparmor/include/cred.h:30 apparmor_cred_free+0x12f/0x1a0 [ 2620.265472][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 2620.272069][ C0] CPU: 0 PID: 18195 Comm: syz-executor4 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2620.281100][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2620.291173][ C0] Call Trace: [ 2620.294459][ C0] [ 2620.297329][ C0] dump_stack+0x1db/0x2d0 [ 2620.301689][ C0] ? dump_stack_print_info.cold+0x20/0x20 [ 2620.307423][ C0] ? apparmor_cred_free+0x30/0x1a0 [ 2620.312545][ C0] panic+0x2cb/0x65c [ 2620.316453][ C0] ? add_taint.cold+0x16/0x16 [ 2620.321148][ C0] ? apparmor_cred_free+0x12f/0x1a0 [ 2620.326365][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2620.332630][ C0] ? __probe_kernel_read+0x1f4/0x250 [ 2620.337935][ C0] ? __warn.cold+0x5/0x48 [ 2620.342275][ C0] ? __warn+0xe8/0x1d0 [ 2620.346362][ C0] ? apparmor_cred_free+0x12f/0x1a0 [ 2620.351593][ C0] __warn.cold+0x20/0x48 [ 2620.355896][ C0] ? apparmor_cred_free+0x12f/0x1a0 [ 2620.361137][ C0] report_bug+0x263/0x2b0 [ 2620.365496][ C0] do_error_trap+0x11b/0x200 [ 2620.370093][ C0] do_invalid_op+0x37/0x50 [ 2620.374517][ C0] ? apparmor_cred_free+0x12f/0x1a0 [ 2620.379717][ C0] invalid_op+0x14/0x20 [ 2620.383881][ C0] RIP: 0010:apparmor_cred_free+0x12f/0x1a0 [ 2620.389686][ C0] Code: 7c 88 48 c7 c7 40 d2 7c 88 e8 5d 69 f2 fd 0f 0b eb a9 e8 64 40 29 fe 48 c7 c6 00 e2 7c 88 48 c7 c7 40 d2 7c 88 e8 41 69 f2 fd <0f> 0b 48 b8 00 00 00 00 00 fc ff df 80 38 00 75 4a 4c 8b 2c 25 00 [ 2620.409282][ C0] RSP: 0018:ffff8880ae6079f8 EFLAGS: 00010286 [ 2620.415342][ C0] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 2620.423328][ C0] RDX: 0000000000000100 RSI: ffffffff81688726 RDI: 0000000000000006 [ 2620.431317][ C0] RBP: ffff8880ae607a18 R08: ffff888055816200 R09: ffff888055816aa0 [ 2620.439284][ C0] R10: ffff888055816200 R11: 0000000000000000 R12: ffff8880425ceb00 [ 2620.447266][ C0] R13: ffff8880425ceb00 R14: ffff8880425ceb88 R15: dffffc0000000000 [ 2620.455302][ C0] ? vprintk_func+0x86/0x189 [ 2620.459897][ C0] ? apparmor_cred_free+0x12f/0x1a0 [ 2620.465096][ C0] security_cred_free+0x4b/0xf0 [ 2620.469954][ C0] put_cred_rcu+0x21f/0x6e0 [ 2620.474455][ C0] ? get_task_cred+0x5e0/0x5e0 [ 2620.479212][ C0] ? lock_release+0xc40/0xc40 [ 2620.483887][ C0] ? __do_softirq+0x30b/0xb11 [ 2620.488595][ C0] ? trace_hardirqs_off_caller+0x300/0x300 [ 2620.494399][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2620.500636][ C0] ? check_preemption_disabled+0x48/0x290 [ 2620.506355][ C0] rcu_core+0xc4a/0x1680 [ 2620.510601][ C0] ? rcu_fwd_progress_check+0xd0/0xd0 [ 2620.516002][ C0] ? clockevents_program_event+0x15f/0x380 [ 2620.521809][ C0] ? add_lock_to_list.isra.0+0x450/0x450 [ 2620.527434][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2620.533664][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2620.539898][ C0] ? check_preemption_disabled+0x48/0x290 [ 2620.545621][ C0] ? __lock_is_held+0xb6/0x140 [ 2620.550391][ C0] __do_softirq+0x30b/0xb11 [ 2620.554905][ C0] ? __irqentry_text_end+0x1f96d2/0x1f96d2 [ 2620.560750][ C0] ? kvm_clock_read+0x18/0x30 [ 2620.565425][ C0] ? kvm_sched_clock_read+0x9/0x20 [ 2620.570550][ C0] ? sched_clock+0x2e/0x50 [ 2620.574962][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2620.581210][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2620.587448][ C0] ? check_preemption_disabled+0x48/0x290 [ 2620.593171][ C0] irq_exit+0x180/0x1d0 [ 2620.597324][ C0] smp_apic_timer_interrupt+0x1b7/0x760 [ 2620.602875][ C0] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2620.608421][ C0] ? smp_call_function_single_interrupt+0x640/0x640 [ 2620.615023][ C0] ? trace_hardirqs_off+0x310/0x310 [ 2620.620215][ C0] ? task_prio+0x50/0x50 [ 2620.624458][ C0] ? check_preemption_disabled+0x48/0x290 [ 2620.630179][ C0] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2620.635724][ C0] apic_timer_interrupt+0xf/0x20 [ 2620.640652][ C0] [ 2620.643592][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x26/0x50 [ 2620.649762][ C0] Code: 46 df ff ff 55 48 89 e5 48 8b 75 08 65 48 8b 04 25 40 ee 01 00 65 8b 15 68 b8 7f 7e 81 e2 00 01 1f 00 75 2b 8b 90 e0 12 00 00 <83> fa 02 75 20 48 8b 88 e8 12 00 00 8b 80 e4 12 00 00 48 8b 11 48 [ 2620.669361][ C0] RSP: 0018:ffff88806f2eed30 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 2620.677896][ C0] RAX: ffff888055816200 RBX: ffff88806f2eeff0 RCX: ffffffff81a89c41 [ 2620.685869][ C0] RDX: 0000000000000000 RSI: ffffffff81a890c0 RDI: 0000000000000005 [ 2620.693834][ C0] RBP: ffff88806f2eed30 R08: ffff888055816200 R09: fffff940002756cf [ 2620.701806][ C0] R10: fffff940002756ce R11: ffffea00013ab673 R12: ffffea00016e1480 [ 2620.709775][ C0] R13: ffffea00016e1488 R14: 1ffff1100de5ddaa R15: 0000000080000001 [ 2620.717757][ C0] ? mark_page_accessed+0x13f1/0x1ee0 [ 2620.723135][ C0] ? mark_page_accessed+0x870/0x1ee0 [ 2620.728426][ C0] mark_page_accessed+0x870/0x1ee0 [ 2620.733544][ C0] ? activate_page+0xf30/0xf30 [ 2620.738306][ C0] ? rcu_read_lock+0x70/0x70 [ 2620.742916][ C0] ? unlock_page_memcg+0x2c/0x40 [ 2620.747846][ C0] ? page_remove_rmap+0x1dc/0x1990 [ 2620.752955][ C0] ? __schedule+0x89f/0x1e60 [ 2620.757541][ C0] ? page_add_file_rmap+0x1420/0x1420 [ 2620.762906][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2620.769140][ C0] ? set_page_dirty+0x5dd/0xfc0 [ 2620.773987][ C0] ? __writepage+0xe0/0xe0 [ 2620.778401][ C0] ? unmap_page_range+0x13cf/0x25a0 [ 2620.783604][ C0] ? find_held_lock+0x35/0x120 [ 2620.788392][ C0] ? kasan_check_read+0x11/0x20 [ 2620.793235][ C0] ? page_mapcount+0x397/0x5b0 [ 2620.798002][ C0] ? fault_around_bytes_set+0xa0/0xa0 [ 2620.803412][ C0] ? kasan_check_write+0x14/0x20 [ 2620.808345][ C0] ? do_raw_spin_lock+0x156/0x360 [ 2620.813365][ C0] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2620.819075][ C0] ? _vm_normal_page+0x15d/0x3d0 [ 2620.824015][ C0] ? __pte_alloc_kernel+0x220/0x220 [ 2620.829227][ C0] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 2620.835034][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2620.840762][ C0] ? __tlb_remove_page_size+0x18c/0x510 [ 2620.846310][ C0] unmap_page_range+0xc95/0x25a0 [ 2620.851272][ C0] ? vm_normal_page_pmd+0x400/0x400 [ 2620.856469][ C0] ? __kernel_text_address+0xd/0x40 [ 2620.861666][ C0] ? unwind_get_return_address+0x61/0xa0 [ 2620.867309][ C0] ? save_stack+0xa9/0xd0 [ 2620.871630][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2620.877906][ C0] ? uprobe_munmap+0x141/0x430 [ 2620.882665][ C0] ? save_stack+0x45/0xd0 [ 2620.886992][ C0] ? __kasan_slab_free+0x102/0x150 [ 2620.892100][ C0] ? uprobe_mmap+0x1190/0x1190 [ 2620.896868][ C0] ? do_group_exit+0x177/0x430 [ 2620.901640][ C0] ? get_signal+0x8b7/0x19c0 [ 2620.906242][ C0] ? do_signal+0x91/0x1ea0 [ 2620.910697][ C0] ? exit_to_usermode_loop+0x2f7/0x3b0 [ 2620.916154][ C0] ? do_syscall_64+0x696/0x800 [ 2620.920914][ C0] ? trace_hardirqs_off+0xb8/0x310 [ 2620.926017][ C0] ? kasan_check_read+0x11/0x20 [ 2620.930870][ C0] unmap_single_vma+0x19d/0x300 [ 2620.935730][ C0] unmap_vmas+0x1a8/0x350 [ 2620.940056][ C0] ? zap_vma_ptes+0x110/0x110 [ 2620.944735][ C0] ? kasan_check_write+0x14/0x20 [ 2620.949672][ C0] exit_mmap+0x2d4/0x5d0 [ 2620.953919][ C0] ? __ia32_sys_munmap+0x80/0x80 [ 2620.958878][ C0] ? __khugepaged_exit+0x42e/0x630 [ 2620.964004][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2620.970243][ C0] ? __might_sleep+0x95/0x190 [ 2620.974944][ C0] mmput+0x240/0x640 [ 2620.978836][ C0] ? is_current_pgrp_orphaned+0xa0/0xa0 [ 2620.984403][ C0] ? set_mm_exe_file+0x200/0x200 [ 2620.989340][ C0] ? do_raw_spin_unlock+0xa0/0x330 [ 2620.994476][ C0] ? up_read+0x212/0x2b0 [ 2620.998718][ C0] ? do_raw_spin_trylock+0x270/0x270 [ 2621.004003][ C0] ? __down_interruptible+0x740/0x740 [ 2621.009385][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2621.015617][ C0] do_exit+0x9d4/0x2b60 [ 2621.019770][ C0] ? mm_update_next_owner+0x970/0x970 [ 2621.025135][ C0] ? __cleanup_sighand+0x70/0x70 [ 2621.030071][ C0] ? mark_held_locks+0x100/0x100 [ 2621.035016][ C0] ? mark_held_locks+0x100/0x100 [ 2621.039973][ C0] ? __might_fault+0x12b/0x1e0 [ 2621.044748][ C0] ? add_lock_to_list.isra.0+0x450/0x450 [ 2621.050376][ C0] ? memset+0x32/0x40 [ 2621.054356][ C0] ? __dequeue_signal+0xeb/0x730 [ 2621.059291][ C0] ? get_signal+0x966/0x19c0 [ 2621.063900][ C0] ? find_held_lock+0x35/0x120 [ 2621.068715][ C0] ? get_signal+0x966/0x19c0 [ 2621.073304][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2621.079540][ C0] ? _raw_spin_unlock_irq+0x28/0x90 [ 2621.084734][ C0] ? _raw_spin_unlock_irq+0x28/0x90 [ 2621.089933][ C0] do_group_exit+0x177/0x430 [ 2621.094537][ C0] ? trace_hardirqs_off_caller+0x300/0x300 [ 2621.100364][ C0] ? __ia32_sys_exit+0x50/0x50 [ 2621.105159][ C0] get_signal+0x8b7/0x19c0 [ 2621.109586][ C0] ? ptrace_notify+0x130/0x130 [ 2621.114350][ C0] ? lock_downgrade+0xbe0/0xbe0 [ 2621.119195][ C0] ? vfs_write+0x2f0/0x580 [ 2621.123630][ C0] do_signal+0x91/0x1ea0 [ 2621.127874][ C0] ? kasan_check_write+0x14/0x20 [ 2621.132804][ C0] ? __mutex_unlock_slowpath+0x195/0x870 [ 2621.138452][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2621.144690][ C0] ? setup_sigcontext+0x7d0/0x7d0 [ 2621.149717][ C0] ? exit_to_usermode_loop+0x98/0x3b0 [ 2621.155089][ C0] ? exit_to_usermode_loop+0x98/0x3b0 [ 2621.160476][ C0] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2621.165761][ C0] ? trace_hardirqs_off_caller+0x300/0x300 [ 2621.171564][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2621.177798][ C0] ? fput+0x128/0x1a0 [ 2621.181772][ C0] ? do_syscall_64+0x8c/0x800 [ 2621.186470][ C0] exit_to_usermode_loop+0x2f7/0x3b0 [ 2621.191804][ C0] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2621.197889][ C0] ? syscall_trace_enter+0x12a0/0x12a0 [ 2621.203367][ C0] do_syscall_64+0x696/0x800 [ 2621.207980][ C0] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2621.213622][ C0] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2621.219339][ C0] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2621.224921][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2621.230808][ C0] RIP: 0033:0x457ec9 [ 2621.234703][ C0] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2621.254296][ C0] RSP: 002b:00007f064b43cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2621.262697][ C0] RAX: fffffffffffffff4 RBX: 00007f064b43cc90 RCX: 0000000000457ec9 [ 2621.270658][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2621.278621][ C0] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2621.286584][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f064b43d6d4 [ 2621.294549][ C0] R13: 00000000004be2a0 R14: 00000000004ce760 R15: 0000000000000005 [ 2621.303602][ C0] Kernel Offset: disabled [ 2621.308036][ C0] Rebooting in 86400 seconds..