, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd1, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x50, 0x2, 0xbe, 0x5, 0x0, 0x3a, 0x2400, 0xa, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x1000, 0xffffffffffffff91, 0x7ff, 0x8, 0xffffffff80000001, 0x5, 0x7, 0x0, 0x1, 0x0, 0x10000}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x385, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3062.345284] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0xad000000}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:41 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x3f00, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0xb4010000}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xcc00}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3062.630896] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3062.651864] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:41 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x4003, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:41 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000280)=0x5, 0x8) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x80, 0x4, 0x0, 0x20, 0x0, 0x7f, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9825, 0x9}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, r0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x448200, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000f00)=ANY=[@ANYBLOB="00f85f520900000000000000c8f5f97267cf3c2907d5f0a6454511a5a855d4923faad388dc545d856cc44fb85e463e25ef17c03256c72d2c5f6f8c217ad53446a7a7862210670176df6254113268b75cdf969c3ce1268260ec76b06a4de3790933af075642590f99c9165f385e50e229bf9c6c6d514f"]) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180), 0x200, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000840)=@security={'security\x00', 0xe, 0x4, 0x630, 0xffffffff, 0x140, 0x0, 0x140, 0xffffffff, 0xffffffff, 0x560, 0x560, 0x560, 0xffffffff, 0x4, &(0x7f00000001c0), {[{{@ipv6={@empty, @empty, [0xff, 0xffffff00, 0x0, 0xffffff00], [0x0, 0xff, 0xffff00], 'ip6gretap0\x00', 'bond_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x1, 0x20}, 0x0, 0xd0, 0x140, 0x0, {}, [@common=@hl={{0x28}, {0x0, 0xd8}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x8, 0x7, 0x530a, 0x0, 0x0, "58f2c576b3adc0936153ccfdcefaa4df3104ae1e739a39ba94b1377fda380d8001b9ae8e58778ba8b7bb1e3d314c517fd3329c39afa1343d1898a2706bb3c163"}}}, {{@ipv6={@mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, [0x0, 0xffffff00, 0xffffffff, 0xffffffff], [0xffffff00, 0xffffffff, 0x0, 0xffffffff], 'bridge0\x00', 'veth0_macvtap\x00', {}, {}, 0x2c, 0x1, 0x4, 0x28}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1f, 'system_u:object_r:v4l_device_t:s0\x00'}}}, {{@ipv6={@private2={0xfc, 0x2, '\x00', 0x1}, @mcast2, [0xff000000, 0xff, 0xff000000, 0xffffffff], [0xff0000ff, 0xff000000, 0xffffffff, 0xffffff00], 'wg2\x00', 'veth0_to_team\x00', {0xff}, {}, 0x3a, 0x2, 0x2, 0x21}, 0x0, 0x210, 0x250, 0x0, {}, [@common=@rt={{0x138}, {0xec5, [0x5, 0x3], 0x6, 0x8, 0x5, [@empty, @mcast2, @rand_addr=' \x01\x00', @mcast1, @private0={0xfc, 0x0, '\x00', 0xf9}, @dev={0xfe, 0x80, '\x00', 0x11}, @dev={0xfe, 0x80, '\x00', 0x27}, @loopback, @local, @private1={0xfc, 0x1, '\x00', 0x1}, @private1={0xfc, 0x1, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, @local], 0x3}}, @common=@srh={{0x30}, {0x6, 0xcb, 0xa4, 0x2, 0x3, 0x2020, 0x80}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x1f, 0x4, "1a1304008fc627f6b65371df97fadb2698f188850ba4bfadd5d224e05331"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x690) r4 = syz_open_dev$audion(&(0x7f0000000240), 0x9, 0x109000) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f00000002c0)) 11:04:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0xba010000}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3062.880510] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x38a, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3063.054006] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0xcc000000}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, &(0x7f0000000080)="b76a76d0ed5015a421d27d7f65205491a23d63639d0a0fa413a860b12d373877c35a3b2c4e4b151140988c1e31e926175b5961e3438eb3900a444d8d928c183400b9d831b607910ad6fb2c654fbbfb69ae48827939431e1841aed4728511a8f35a2c14070b3867abd3802117f73a44f4c8affef08df2adbe44a1afdb8b93727a9ad5338241ab0028a0e365cbc0e320372bb181971b901b8ce74d97dee266fc34a1", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="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") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) [ 3063.266243] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3063.275175] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xd100}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:42 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x4801, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3063.418377] Bluetooth: hci2: command 0x0419 tx timeout [ 3063.430916] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3d4, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0xd1000000}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xd403}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000180)={'macsec0\x00', &(0x7f0000000080)=@ethtool_rxnfc={0x2f, 0x11, 0x4, {0x0, @ah_ip6_spec={@private0, @loopback, 0x80000001}, {0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x14}, 0xffff, 0x5, [0x2400000, 0x8]}, @hdata="ea9e7a4a4ec7b3bc5538ee7fad4264d72f97671cf2d5cee8168ad7ee30481c9c873ff19b13cfdbe4882ed797fa7222d3ec13af51", {0x0, @random="3e32bcdfbe0f", 0x9, 0x1, [0x0, 0x80000000]}, 0xfff, 0x7}, 0x2, [0x4, 0x8]}}) 11:04:42 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x4a01, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:43 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xda03}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x4e00, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0xd4030000}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3da, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) copy_file_range(r0, &(0x7f00000000c0)=0x7f, r1, &(0x7f0000000100)=0x1, 0x8, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x5200, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0xda030000}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:43 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xf303}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3f3, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:43 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000100)=0x100000001, 0x2) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000140)='.\x00', 0x1a3) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r1 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) bind(r1, &(0x7f0000000080)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x5a00, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:44 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) pwritev(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)="597a5e92e7ad11174cc9432cd68b357dd0ba7ab67298a13328df3b19109e2e8c85b856f51ba0ef0ad9609fd52a8dd0811557373cbcafaf07dcaa3802f77a85", 0x3f}], 0x1, 0x5, 0x7f) r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xc280437c9b4fe742, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2d}}, {@max_read={'max_read', 0x3d, 0x7}}], [{@dont_appraise}, {@pcr={'pcr', 0x3d, 0x2c}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_gt={'fowner>', 0xee00}}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@dont_hash}, {@fsname={'fsname', 0x3d, '\x00'}}, {@dont_hash}]}}) r3 = openat(r2, 0x0, 0x0, 0x141) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r3, 0xc0045103, &(0x7f0000000080)=0xd17) 11:04:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xf801}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:44 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0xf3030000}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x500, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:44 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x5a02, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:44 executing program 1: open_by_handle_at(0xffffffffffffffff, &(0x7f00000001c0)=@fuse={0xc, 0x81, {0x7fffffff, 0x81, 0xfff}}, 0x4000) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r1, 0x50a, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x801}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)=',\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x40000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:44 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0xf8010000}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x600, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:44 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x6202, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x0, 0x0, 0x4a}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:45 executing program 1: r0 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xc280437c9b4fe746, &(0x7f0000002a40)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfffffffffffffffa}}, {@max_read={'max_read', 0x3d, 0x3}}], [{@dont_appraise}, {@pcr={'pcr', 0x3d, 0x2c}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_gt={'fowner>', 0xee00}}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@dont_hash}, {@fsname={'fsname', 0x3d, '\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x894a}}]}}) r1 = openat(r0, 0x0, 0x0, 0x141) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0), 0xc000, 0x0) read$FUSE(r1, &(0x7f0000000840)={0x2020, 0x0, 0x0}, 0x2020) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000002880)={{{@in6=@private1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @dev}}}}, &(0x7f0000000100)=0xe8) write$FUSE_ENTRY(r2, &(0x7f0000002980)={0x90, 0x30, r3, {0x2, 0x3, 0x1, 0x3, 0x0, 0x7f, {0x2, 0x7, 0x14a4f4f0, 0x1, 0x400, 0xfffffffff69ff075, 0x0, 0x5, 0x84a, 0x8000, 0x6, r4, 0xffffffffffffffff, 0x4}}}, 0x90) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x2, 0x0, 0x486}, 0x0, 0xfffffffffffffffc, r1, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/120, 0x78}, {&(0x7f0000000240)=""/69, 0x45}, {&(0x7f0000000140)=""/20, 0x14}, {&(0x7f0000002bc0)=""/250, 0xfa}], 0x4, 0x38000000, 0x297) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:45 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x100000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:45 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/igmp\x00') setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f00000000c0)=0x3, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xc280437c9b4fe742, &(0x7f0000000840)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2d}}, {@blksize={'blksize', 0x3d, 0x800}}], [{@dont_appraise}, {@pcr={'pcr', 0x3d, 0x2e}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, '-!&\xce$'}}, {@fowner_gt={'fowner>', 0xee00}}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@dont_hash}, {@fsname={'fsname', 0x3d, '\x00'}}, {@dont_hash}]}}) r3 = openat(r2, 0x0, 0x0, 0x141) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r3, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa0, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x100}, @NFACCT_FILTER={0x24, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x45}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xfffff4d8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7}]}, @NFACCT_FILTER={0x34, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x2}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1f}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xffffffff}]}, @NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x80000001}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}]}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x80}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000}, 0x400) [ 3066.648434] secmark_tg_check: 54 callbacks suppressed [ 3066.648441] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3066.648549] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:45 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x6603, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x0, 0x0, 0x4e}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:45 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0xffff1f00}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3066.700125] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3066.726858] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x700, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:45 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1fffff}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3066.794200] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:45 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0xfffffffffffffccd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x4000}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00002f5ff8)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0xd, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x801, 0x2) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x80, 0x6a, 0x9, 0x0, 0x0, 0x80000001, 0x80108, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000200), 0x4}, 0x200, 0xff, 0xffffffff, 0x1, 0xc657, 0x17f9, 0x20, 0x0, 0x5e73, 0x0, 0x73a}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x1000000, &(0x7f0000000080)="16364a6030dcdfbd2b649df925359798d24a4559e64bc59a9f2c923e503da44f47", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="f4472a5f46c326867989931ca1b368ab4bc08ebcbc7fbaafa54faafb92f47a169fba821b1898d39b3fa240dc145173c68357a48ffbf99d14c5b7289c51a4c87766fd3f361827280f37a83f913fe7093a7a179a95a8d621756c2a7d6e38c47593af06f1bfdc29edfde71c6a22ec24828956698f40148ef1a548ff31aa51099c20722a426324f251a5c70eaad4999d25a7cc6a4d2cf9ab9321529d2710") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) [ 3067.024944] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:46 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1002, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3067.154050] xt_ct_set_helper: 22 callbacks suppressed [ 3067.154069] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3067.160670] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3067.170814] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:46 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x6c00, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x0, 0x0, 0x5a}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3067.209867] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3067.223650] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:46 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0xffffff7f}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:46 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x418}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x1) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, &(0x7f0000000080)="f530331312e57c7e376e3844449bd0f39bcd377292ccb224b299136b9013f2fa7f503b50613eb15f87b9c1eeea178584fbdd15b5c7c1feb3d683a20950727b2170", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="cde350c350505505cb7d6cbae0ec5356077ff17b3b9a") socket(0x21, 0xa, 0x0) poll(0x0, 0x0, 0x101) socket$inet6_tcp(0xa, 0x1, 0x0) [ 3067.438251] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3067.442784] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:46 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xc280437c9b4fe742, &(0x7f0000000a40)=ANY=[@ANYBLOB="74643df9e535b40978c75d4ac64aea22757882f08996b1832e315f2382e54fd155bd87ad0af7db624b7528c19dd84a81a1f3542e13a73e6b50ede2d601b518eb5cb006bdce2f32f5f4f8122a600cf2ef336c56a180a0a3651506f8e90c000000000c1eca159742e8a147553bc007f42fbd72b30ef5168ea8197b75b2f99f37636031600c502d1abf44bb3d0d64e1", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c6d61785f726561643d3d78303030303030b9b448b104034d3250303030303030303032642c6d61785f726561643d3078303030303030303030303030303030372c646f6e745f61707072616973652c7063723d303075303030bb1779a9e11be92b6be430303030303030303030303034", @ANYRESDEC, @ANYBLOB="2c667549b3f10e61920b6515667f229358", @ANYRESDEC=0xee00, @ANYBLOB=',obj_role=\x00,dont_hash,fsname=\x00,dont_hash,\x00']) r1 = openat(r0, 0x0, 0x0, 0x141) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x7, 0x80, 0x5, 0x3, 0x2, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x67c, 0x1, @perf_bp={&(0x7f0000000080)}, 0x56018, 0x4, 0x966, 0x6, 0x7fffffff, 0x7, 0x7, 0x0, 0x19eb, 0x0, 0xfff}, r1, 0xa, 0xffffffffffffffff, 0x8) socket(0x0, 0x0, 0x0) clone(0x10000, &(0x7f0000000200)="98fa7ebe541a88fdf1026a036c809a18b235f8361fd594d3fa8b686a98b395533e07c8e5b5be68d321114710a7322346167449fe61bbfdefc300ff2118f2efa91349929b01ad2bc80ec5b34d5a548dae627f913efb1ff9b49f0fb8c44d368eed248f5c5150171525", &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000840)="77858ee881d1f61d32fef1b1") openat$cgroup_type(r1, &(0x7f00000001c0), 0x2, 0x0) preadv(r1, &(0x7f0000000a00)=[{&(0x7f0000000880)=""/57, 0x39}, {&(0x7f00000008c0)=""/13, 0xd}, {&(0x7f0000000900)=""/224, 0xe0}, {&(0x7f0000000c40)=""/4096, 0x1000}], 0x4, 0xfd, 0x4) poll(0x0, 0x0, 0x101) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) close(r3) 11:04:46 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x8503, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:46 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0xffffff80}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x2000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3067.755064] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3067.784340] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:46 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1403, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x0, 0x0, 0x64}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:47 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x8a03, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3068.166462] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1602, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3068.309087] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x2}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x0, 0x0, 0x7e}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:47 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x3000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:47 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xa402, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x0, 0x0, 0xd1}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x0, 0x0, 0xea}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3068.760265] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1e01, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:47 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xa800, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:47 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x400, &(0x7f00000000c0)="a9dfa666a130375fe77b3774ef5e4b9ff9df4714a035ca8215b3496fbbdb3edd328a54243cfa2618ea925ba7d7e185123ed8511750f4e8e6b53dce976a14293cb2b981aa617e19c8fd28d2777ee0cd26a2cbe97a8da7bba6ac134ffe07161424fdcd4e118dbb6eaf3450fec3d8000c30a1770b9d19d8ef6be3c7f937f5b0860c3f7dbb0f7fbd68a8d14cc8b95cc0f63939e9b5d34165a41206f79e2fadad2f72af9e689e21377b55c00c9b5df5c0660ffd960dc022bfab9091cdaf58aef093ac243f60508ed5004b6c28dad4886690190a9b64704ade", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000840)="5083156d7ec234124a339508dc149888a3b51cdee495136e98e88f07cb8334ef3abfaa098b887c70dfe81b6f7ed21ebb59c07cf7cc1b77d83672bffa4df62964d9bb45990ba6ed0e04865343c098a35c63eb318e387d69edb4559d0776450452a06215eee9f37d77f27a6dcc33b85abd4487ce3fe64652d174c4b1c496919e216fc7a5d99e2a24db19c34098c9073f1eb4146e9636b8591ba124c90c7719d367fcb53b746d6ba81ff87552528474538562d0ef2e45605905b90181276b1451e7e16b92b82d580f7d89cecdce") r0 = socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x3}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x0, 0x0, 0xf0}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3069.076216] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x2000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:48 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x5000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:48 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xad00, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3069.531157] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:48 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x4, 0x7fff}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x2801, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x5}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:48 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x6000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x2, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:48 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xb001, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:49 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000880), 0x600440, 0x0) mmap(&(0x7f00006e4000/0x1000)=nil, 0x1000, 0x100000e, 0x4010, r1, 0x6145e000) openat$cgroup_freezer_state(r0, &(0x7f0000000840), 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) process_vm_writev(r3, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0xd, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x801, 0x2) r4 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xc280437c9b4fe742, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2d}}, {@max_read={'max_read', 0x3d, 0x7}}], [{@dont_appraise}, {@pcr={'pcr', 0x3d, 0x2c}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_gt={'fowner>', 0xee00}}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@dont_hash}, {@fsname={'fsname', 0x3d, '\x00'}}, {@dont_hash}]}}) r5 = openat(r4, 0x0, 0x0, 0x141) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r5, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x20, 0xd2, 0xf7, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, @perf_config_ext={0x10000, 0x7}, 0x1020, 0x7, 0xfffff03f, 0x6, 0xc3a8, 0x80000001, 0x8, 0x0, 0xfffff999, 0x0, 0x3}, r3, 0x1, r5, 0x9) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x7000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:49 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x2803, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:49 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0x1f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000000c0), 0x0, 0x10001, 0x401) poll(0x0, 0x0, 0x101) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:49 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xb401, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x6}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x8000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:49 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3101, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x7}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:49 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00002f5ff8)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0xd, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x801, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x3f, 0x3, 0x1, 0x6, 0x0, 0x5, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0x40808, 0x8f2, 0x6de, 0x2, 0x7fffffff, 0x3, 0x8001, 0x0, 0xd5edc48, 0x0, 0x9}, r1, 0x7, 0xffffffffffffffff, 0x3) poll(0x0, 0x0, 0x101) clone(0x40000000, &(0x7f0000000080)="cd54", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="5296bbc22a4faf17cf81b92e1dd3915e8763417cc618930b54256287eb46ebe7f57fd48e0f780434e4dd7adb8b697ad2ae8aef497e99e1ec31e425c4bde71885347bfb76b7f9de7c3732e250b917e3d0afa08beb1f7b8e5351d8aacec5db2738fd1e5d11cf5f3a6d7aa6ea3f7e7828d3a81631d35151e935e2bd21e2fad59695be0f106e485ccac1439ffc03c13e389e034a48f764f33d17597870ec73cad390b9f1bd71a5d9d8e5849ea2de8bb11d159e542c5bab8dac4c6cf8e1") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:49 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xba01, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3071.008381] IPVS: ftp: loaded support on port[0] = 21 11:04:50 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xcc00, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x8}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x10020000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x5, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3071.384121] IPVS: ftp: loaded support on port[0] = 21 11:04:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3f00, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4e}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:50 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='{[\'\x00') poll(0x0, 0x0, 0x101) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) [ 3071.691105] secmark_tg_check: 57 callbacks suppressed [ 3071.691113] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3071.694567] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x14030000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x6, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3071.742844] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:50 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xd100, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4003, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3072.054385] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x7, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3072.221818] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3072.258233] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3072.258635] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x16020000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x52}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3072.347196] xt_ct_set_helper: 17 callbacks suppressed [ 3072.347244] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3072.361601] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:51 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00'}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0xfa, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000002a40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000000080)=@l2, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000840)=""/4096, 0x1000}, 0x9}, {{&(0x7f0000000140)=@tipc=@name, 0x80, &(0x7f0000001cc0)=[{&(0x7f00000001c0)=""/177, 0xb1}, {&(0x7f0000001840)=""/166, 0xa6}, {&(0x7f0000000280)=""/70, 0x46}, {&(0x7f0000001900)=""/203, 0xcb}, {&(0x7f0000001a00)=""/26, 0x1a}, {&(0x7f0000001a40)=""/93, 0x5d}, {&(0x7f0000001ac0)=""/235, 0xeb}, {&(0x7f0000001bc0)=""/244, 0xf4}], 0x8, &(0x7f0000001d40)=""/140, 0x8c}, 0x7ff}, {{&(0x7f0000001e00)=@ipx, 0x80, &(0x7f0000002480)=[{&(0x7f0000001e80)=""/116, 0x74}, {&(0x7f0000001f00)=""/248, 0xf8}, {&(0x7f0000002000)=""/4, 0x4}, {&(0x7f0000002040)=""/32, 0x20}, {&(0x7f0000002080)=""/33, 0x21}, {&(0x7f00000020c0)=""/119, 0x77}, {&(0x7f0000002140)=""/26, 0x1a}, {&(0x7f0000002180)=""/196, 0xc4}, {&(0x7f0000002280)=""/205, 0xcd}, {&(0x7f0000002380)=""/202, 0xca}], 0xa, &(0x7f0000002540)=""/121, 0x79}}, {{&(0x7f00000025c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000002880)=[{&(0x7f0000002640)=""/248, 0xf8}, {&(0x7f0000002740)=""/25, 0x19}, {&(0x7f0000002780)=""/242, 0xf2}], 0x3, &(0x7f00000028c0)=""/74, 0x4a}, 0x8}], 0x4, 0x40, &(0x7f0000002a80)={r2, r3+60000000}) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x3c0, 0x120, 0x268, 0x300, 0x120, 0x268, 0x2f0, 0x460, 0x460, 0x2f0, 0x460, 0x3, 0x0, {[{{@ipv6={@private0={0xfc, 0x0, '\x00', 0x1}, @empty, [0xff000000, 0x0, 0xffffffff, 0xffffffff], [0xffffff00, 0xffffffff, 0x0, 0xff000000], 'wg0\x00', 'virt_wifi0\x00', {0xff}, {0xff}, 0x0, 0xff, 0x6, 0x4b}, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@inet=@udp={{0x30}, {[0x4e20, 0x4e22], [0x4e22, 0x4e23]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [0x0, 0x0, 0xff000000], 'wg0\x00', 'ip6_vti0\x00', {}, {}, 0x29}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x420) [ 3072.412532] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:51 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4801, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x8, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3072.638486] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3072.638726] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3072.688916] x_tables: ip6_tables: udp match: only valid for protocol 17 11:04:51 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80004200, &(0x7f0000000180)="0bad8886202dbc401a8ab3", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="ae3f5ccb833aae6074b19dfec9034863f26e6b1d2a2d77bd75a7af7e11") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x4, 0x4, 0x6, 0x8, 0x0, 0x3, 0x4000, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0xa31}, 0x8, 0x4, 0x8, 0x3, 0xffffffffffff8001, 0x6, 0xfffd, 0x0, 0xb6, 0x0, 0xc67}, 0xffffffffffffffff, 0x2, r0, 0x9) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x8, 0x4, 0x1, 0x0, 0x0, 0x3ff, 0x4080, 0xe, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xffffffff, 0x1, @perf_config_ext={0x3}, 0x900, 0x4, 0x1000, 0x2, 0x7f, 0x4, 0x8, 0x0, 0x6, 0x0, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:51 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xd403, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3072.762354] x_tables: ip6_tables: udp match: only valid for protocol 17 11:04:51 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x5a}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1e010000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3072.832142] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3072.840622] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3073.063238] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:52 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x280, &(0x7f0000000100)="c508d00fd3df6d5afe36e9a5685ba7ecc89968a392011f4e118f17d8248c82f6ea0c12eecb799a66d4d35d79bc5eca0580219120bc56a726d15ae7c4c61c03a16d6bc36b6d5f84ee2e54e7a5da03c434b3e6abb49956fabc9b08b236d0b4de27", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000001240)="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") perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x4, 0x42, 0x9, 0x6, 0x0, 0x81, 0xa000, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x0, 0x1}, 0x10000, 0x200, 0x80, 0x3, 0x0, 0x100, 0xca, 0x0, 0xffffffff, 0x0, 0x3}, 0x0, 0xe, r0, 0xb) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) r2 = socket$inet_sctp(0x2, 0x1, 0x84) write$binfmt_aout(r2, &(0x7f0000000840)={{0xcc, 0x0, 0x2, 0x359, 0x25e, 0x70000000, 0xcf, 0x15}, "55377a6dd9c8b562ab01249cd7ff2da49f737b7106271ca5acc1051abe1457b8a8fd5dc95002776553f79ac02f4a1525bc07a4ee645bafed7b47d55d8bf7b6899eb28bb6e46ab14f7ffec811cd6073b6fcff5cdf61e9fe59a8e9dfe902d8c06341b916053f4fa766051f8e2f7508e4feda65b5f62e187a511dd6f7988e30c723d611defc5f544ca4aaf9b76e417edf8717422cca0d7e5e2884ab2f76c06106a17c628f650ec2a04c17a2cf9b5c251c7e138c73d7232a3a195254577a9080310302", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9e1) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) fcntl$dupfd(r3, 0x0, r1) 11:04:52 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xda03, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3073.282419] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4a, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:52 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x20000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:52 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4a01, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:52 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x60}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3073.556409] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:52 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) clone(0x20087104ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000100)='auxv\x00') exit_group(0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') read$FUSE(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) [ 3073.771573] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:52 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xf303, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:52 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x28010000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3073.894612] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4e, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:52 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4e00, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:52 executing program 1: ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000180)=@get={0x1, &(0x7f0000000080)=""/228, 0x80}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000340)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6}, 0xd8) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$inet(r0, &(0x7f0000000b80)={&(0x7f00000001c0)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000200)="902a24816430250984e8b4360f33a44ff1eec3b15b3d3c853dcc25677fb0071fe282c6bba111dade0b952dc171f4e8eb5018f50b9b81e419183a958af666c494e96f8c3ff064dfddf8e60cf509490b5a829af9fe5f2cbaea9b4bd775e9f8897da226d673f43df9da08833752bec8c43f9162f1e47713698aab1cdfed90614fad8d981aa3e70d428747db6bf36abc01d746601a5cb258db9c19507fcb60683e34d5881a57463e8ff0b5910ba89c46bf2023dc3b2ecbc028e33f06e332fa336c", 0xbf}, {&(0x7f0000000840)="e7736c285107ddefcfdf341288d468c47aadf2318158155a40b5276c308e1d163815456e82b6a3f0e91e172fbf69e6984d006119462735075268d39263f4c7677ece5d962cf729ccaa223d725fa600dd70734f08a816903f02a77812dbdb1759e0ae564a25b70694598c06fa45dd58a4285c937647141f7d239376b9f75902e0d782de40258dd4dccf5a60374d8625e27b4445095a10920196a19efb24fb4475c84006b9c7012ce804b112d0dfa0137e5e139cf9665bf2e6a69a76f83b7f20c0528ab504966b164ef16f", 0xca}, {&(0x7f0000000940)="8defb562a29563d59b02be318543400b6e954c6bbef06239aef09c25a111e43bc819e1f6c2b4332a018bd66b98f07e51fa357caaba2a7b0c19df3ff1872e5187eb6d8f748ec87b1049beb3e52ba6eceef3a71e12cb6912d18ef4c87b36e79f51f8cf1091e5d66ac6f0321570011ac2d814786b780aa69e14f3bbe1ede7b3a004a3b218820a9d5d32c11b12f33d9f4676689138996210bd22e62f45847102daf6b60238bd026147f33e3c56578c8aa7a3cb0a7d875ae29a0b85496ebc27ad442f066af8c59c6cb7de50e7673d69dc69f7deb14a63df756b13", 0xd8}, {&(0x7f0000000a40)="37a5d4434a15e90726247d423e05ce514f846219efc122da39002576d772f120a8178e5ee48b9715cbee0b991dafa5abd9e8d5b955c2fc7bf452077540cd810eb43bcf4e9b8d", 0x46}], 0x4, &(0x7f0000000ac0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x39f8}}, @ip_tos_int={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x1d}, @empty}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}], 0xa0}, 0x20008800) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:52 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x6c}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3074.167569] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:53 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xf801, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x5200, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:53 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x54, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x5a, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:53 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xa8}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x28030000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:53 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x418, 0x260, 0x268, 0x300, 0x0, 0x268, 0x348, 0x460, 0x460, 0x348, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x260, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x4, 0x3, 0x400, 0x10001, 'netbios-ns\x00', 'syz0\x00', {0x7fff}}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0xff, 0x0, {0x40}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x478) 11:04:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x5a00, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x31010000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x64, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:53 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x40000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:54 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xad}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:54 executing program 1: r0 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xc280437c9b4fe742, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2d}}, {@max_read={'max_read', 0x3d, 0x7}}], [{@dont_appraise}, {@pcr={'pcr', 0x3d, 0x2c}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_gt={'fowner>', 0xee00}}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@dont_hash}, {@fsname={'fsname', 0x3d, '\x00'}}, {@dont_hash}]}}) r1 = openat(r0, 0x0, 0x0, 0x141) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) recvmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/124, 0x7c}, {&(0x7f0000000180)=""/185, 0xb9}], 0x2, &(0x7f0000000840)=""/4096, 0x1000}, 0x42) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xc280437c9b4fe742, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2d}}, {@max_read={'max_read', 0x3d, 0x7}}], [{@dont_appraise}, {@pcr={'pcr', 0x3d, 0x2c}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_gt={'fowner>', 0xee00}}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@dont_hash}, {@fsname={'fsname', 0x3d, '\x00'}}, {@dont_hash}]}}) r3 = openat(r2, 0x0, 0x0, 0x141) r4 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xc280437c9b4fe742, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2d}}, {@max_read={'max_read', 0x3d, 0x7}}], [{@dont_appraise}, {@pcr={'pcr', 0x3d, 0x2c}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_gt={'fowner>', 0xee00}}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@dont_hash}, {@fsname={'fsname', 0x3d, '\x00'}}, {@dont_hash}]}}) r5 = openat(r4, 0x0, 0x0, 0x141) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r5, 0x0) mount$fuse(0x0, &(0x7f0000001900)='./file0\x00', &(0x7f0000002bc0), 0x80, &(0x7f0000002c00)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}], [{@subj_type={'subj_type', 0x3d, 'fuse\x00'}}, {@pcr={'pcr', 0x3d, 0x8}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@subj_role={'subj_role', 0x3d, '!'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wg2\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'user_id'}}]}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) recvmsg$kcm(r3, &(0x7f0000002b80)={&(0x7f0000001840)=@ax25={{}, [@rose, @default, @bcast, @null, @rose, @null, @null, @bcast]}, 0x80, &(0x7f0000002a80)=[{&(0x7f00000018c0)=""/57, 0x39}, {&(0x7f0000001900)}, {&(0x7f0000001940)=""/157, 0x9d}, {&(0x7f0000001a00)=""/116, 0x74}, {&(0x7f0000001a80)=""/4096, 0x1000}], 0x5, &(0x7f0000002b00)=""/85, 0x55}, 0x12001) poll(0x0, 0x0, 0x101) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x7e, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:54 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x3f000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:54 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xcc}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:54 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x100000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x5a02, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:54 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x2802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x141401, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x5, 0x1, 0x5, 0x0, 0x0, {0x5, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xd0}, 0x800) 11:04:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xd1, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x40030000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x6000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:55 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1fffff, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xd1}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:55 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x29, 0x800, 0x2) poll(0x0, 0x0, 0x101) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xc280437c9b4fe742, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',max_read=0x000000000000002d,max_read=0x0000000000000007,dont_appraise,pcr=00000000000000000044,fowner<', @ANYRESDEC, @ANYBLOB="2c66756e633d43524544535f434845434b4b437f8546630932", @ANYRESDEC=0xee00, @ANYBLOB=',obj_role=\x00,dont_hash,fsname=\x00,dont_hash,\x00']) r3 = openat(r2, 0x0, 0x0, 0x141) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x20, 0x0, 0x20, 0x1, 0x0, 0x3f, 0x9805, 0x10, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x5}, 0x4180, 0x5, 0x10000, 0x8, 0x8001, 0x7, 0x1, 0x0, 0x7f, 0x0, 0x7}, r3, 0xe, r0, 0x4) 11:04:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x48010000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3076.826533] secmark_tg_check: 43 callbacks suppressed [ 3076.826541] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3076.826749] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xea, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3076.985217] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3077.011980] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x6202, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3077.012200] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3077.056673] x_tables: ip6_tables: CT target: only valid in raw table, not h, 11:04:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x11e}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3077.112556] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:56 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1000000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:56 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x8aa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) clone(0x800, &(0x7f0000001cc0)="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", &(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)="688c163cb6b284d5048e3cacf2bc8a5f5a81ac7c7f58669d33d9dd") poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xc280437c9b4fe742, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2d}}, {@max_read={'max_read', 0x3d, 0x7}}], [{@dont_appraise}, {@pcr={'pcr', 0x3d, 0x2c}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_gt={'fowner>', 0xee00}}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@dont_hash}, {@fsname={'fsname', 0x3d, '\x00'}}, {@dont_hash}]}}) getdents(0xffffffffffffffff, &(0x7f0000000000)=""/96, 0x60) getdents64(0xffffffffffffffff, &(0x7f0000000cc0)=""/4086, 0xff6) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x2, [0x0, 0x0]}, &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, r3) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000002cc0)={r2, 0xfffa, 0xffc, "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"}, 0x1004) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000840)={r2, 0x401, 0xd, 0x40}, 0x10) r5 = openat(r1, 0x0, 0x0, 0x141) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r5, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000140)={r0, 0x9, 0x61, 0x9}) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x6, 0x3f, 0x5, 0x6, 0x0, 0x0, 0x29004, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x800, 0x5, 0x3ff, 0x3, 0x9, 0x80, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r5, 0xc, r6, 0xa) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 11:04:56 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4a010000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3077.372905] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3077.373113] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3077.406270] xt_ct_set_helper: 17 callbacks suppressed [ 3077.406277] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3077.445226] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xf0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3077.659802] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:04:56 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xab196bdf2b91f8d}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@bridge_delneigh={0x4c, 0x1d, 0x200, 0x70bd28, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x40, 0x18, 0xb}, [@NDA_VLAN={0x6, 0x5, 0x3}, @NDA_IFINDEX={0x8}, @NDA_VLAN={0x6, 0x5, 0x2}, @NDA_VLAN={0x6, 0x5, 0x3}, @NDA_LINK_NETNSID={0x8, 0xa, 0xb319}, @NDA_VLAN={0x6, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x5) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) [ 3077.719935] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3077.728084] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:56 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4e000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x6603, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3078.000798] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:56 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1020000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000000)) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000840)={{0x0, 0x2, 0x6, 0x6, 0x6, 0x401, 0x4ca8, 0x7, 0x6, 0x1000, 0xffffffff, 0x773, 0xfc, 0x1, 0x4}}) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000001840)={r3, 0x4}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:57 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x128}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3078.195587] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x11e, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3078.280350] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x52000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:04:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x6c00, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3078.509375] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3078.524981] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:57 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x2000000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:57 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x131}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x130, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3078.741779] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) clone(0x40000080, &(0x7f0000000080)="015d3f247117daf6da48da323cf1db71017c09803b42f35873afacac7bab2209183d8227d950d8c029d693a9a910783649f0ac94d538146b3e2baa552427d19c0a4eb048e2810e8cc93d01511f6c1d9dfa293b37c8bfe9a29d1fc03f442544a99c926755e8", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="0c613ef0be3c70af94ff480c6478e602393c96ae2c3c4207d10f290e219c0662ab") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:04:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x5a000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3078.874392] xt_CT: You must specify a L4 protocol and not use inversions on it 11:04:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x8503, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:58 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x131, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:58 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x148}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:04:58 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x3000000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:58 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x5a020000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3079.445792] IPVS: ftp: loaded support on port[0] = 21 [ 3079.569288] IPVS: ftp: loaded support on port[0] = 21 11:04:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x8a03, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:58 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x7000000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:04:58 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1b0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xa402, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:04:59 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x8000000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3082.699003] ieee802154 phy0 wpan0: encryption failed: -22 [ 3082.704611] ieee802154 phy1 wpan1: encryption failed: -22 11:05:04 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:05:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x14a}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1c6, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:04 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xa800, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:04 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x60000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:04 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x10020000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3085.973089] secmark_tg_check: 29 callbacks suppressed [ 3085.973109] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3085.973163] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3086.107187] xt_ct_set_helper: 10 callbacks suppressed [ 3086.107208] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3086.116003] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3086.126397] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:05 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) clone(0x14000, &(0x7f0000000840)="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", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="ee35fa43a3627bddb88f0c3666a9439a2b7e73fd5d1c0149caf8afdf84ed1f8a825f8d2e90cee4846708776ab60f99c1241902ef1758b7ec24bd0cecc1be9509c3de39c6127b3060f9409cfb7131a3d5") [ 3086.183521] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1f8, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:05 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1b4}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3086.277804] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3086.292453] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3086.292711] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3086.300395] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:05 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xad00, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:05 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x14030000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3086.347872] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3086.348084] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:05 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x62020000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3086.429332] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3086.603710] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3086.603986] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3086.633730] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:05 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x66030000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:05 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fsetxattr(r0, &(0x7f0000000080)=@known='user.syz\x00', &(0x7f00000000c0)='raw\x00', 0x4, 0x2) poll(0x0, 0x0, 0x101) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) [ 3086.794948] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:05 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1ba}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3086.840294] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:05 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xb401, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:05 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x16020000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x203, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3087.231778] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3087.234654] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:06 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1f8}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xba01, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x6c000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x210, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:06 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x720000}, 0x0, 0xffffffffffffff7f, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x8, 0x5, 0x3, 0x6, 0x0, 0x1, 0x10600, 0xf, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x640, 0x2, @perf_bp={&(0x7f0000000080), 0x7}, 0x120a0, 0xaa3, 0x3, 0x0, 0x6, 0x3, 0x80, 0x0, 0x10000, 0x0, 0x4}, 0x0, 0x7, r0, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) clone(0x82000000, &(0x7f0000000140)="927ed72ff51a9380805db8d8ffd14eba4717c5163c319f2c363f3527bbf9746087551a398a90b7f6dc572d51ca73477ca2471f193c55d47a38be", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="b5d077dbcda6447a48d83793286684e4d952b00c371fa5f87ca0384f7d3644d347839b04ac9e2db5681911e86839e921ede9fa2857067583070b8376e42fca29d503abd1ffc3b8ec0476c2a02f87a63ba9039dce3374836b7c1329e3f719a00cae15670af801124134faf53cea1119ed814be3723f339ce97cb98621feb461da98c5551874cbc9a1036c1f65294aecad1675f024ecbfe29a6883ad2f35ba4d92001a80d3afba80d27393e5c085368eee") 11:05:06 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1e010000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:06 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x210}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:06 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000040)={r1, r2/1000+60000}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) fcntl$getown(0xffffffffffffffff, 0x9) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:05:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x216, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xcc00, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x80ffffff}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:06 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x28010000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x24a, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x216}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xd100, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:07 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:05:07 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x28030000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x85030000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:07 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x31010000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x262, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:07 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xc280437c9b4fe742, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2d}}, {@max_read={'max_read', 0x3d, 0x7}}], [{@dont_appraise}, {@pcr={'pcr', 0x3d, 0x2c}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_gt={'fowner>', 0xee00}}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@dont_hash}, {@fsname={'fsname', 0x3d, '\x00'}}, {@dont_hash}]}}) r3 = openat(r2, 0x0, 0x0, 0x141) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0), 0x301800, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000002, 0x10, r4, 0xf6c11000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r3}) 11:05:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x25a}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xd403, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x8a030000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:07 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x3f000000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x26c, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:08 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xc280437c9b4fe742, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2d}}, {@max_read={'max_read', 0x3d, 0x7}}], [{@dont_appraise}, {@pcr={'pcr', 0x3d, 0x2c}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_gt={'fowner>', 0xee00}}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@dont_hash}, {@fsname={'fsname', 0x3d, '\x00'}}, {@dont_hash}]}}) r1 = openat(r0, 0x0, 0x0, 0x141) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='f2fs_update_extent_tree_range\x00', r1}, 0x10) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:05:08 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xda03, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:08 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x40030000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x262}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:08 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xa4020000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3089.440236] x_tables: ip6_tables: CT target: only valid in raw table, not h, 11:05:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x2c4, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:08 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r1, 0x2, 0x4, 0xffffffff80000001}) ioctl$VIDIOC_G_TUNER(r2, 0xc054561d, &(0x7f00000000c0)={0x7, "33a794d059c7fecc2eb23e014ca9e557b36224d6f2eba76b38f5019950f72ebd", 0x5, 0x10, 0x8, 0x3f, 0x2, 0x2, 0x5, 0x9}) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:05:08 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xf303, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:08 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x48010000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x300, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:08 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xf801, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:08 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x4a010000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xa8000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x2a4}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:09 executing program 1: mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x1010, 0xffffffffffffffff, 0xea6e6000) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:05:09 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x4e000000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x40000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x300}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x302, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00002f5ff8)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0xd, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x801, 0x2) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 11:05:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x328, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:09 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x52000000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3091.000576] secmark_tg_check: 57 callbacks suppressed [ 3091.000619] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3091.005370] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x100000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3091.043954] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xad000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x314}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:09 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000800), 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x0) [ 3091.153200] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3091.169087] xt_ct_set_helper: 29 callbacks suppressed [ 3091.169096] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3091.213747] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:10 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x20, 0x140a, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x20}}, 0x0) 11:05:10 executing program 1: sendto$ax25(0xffffffffffffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0) 11:05:10 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x84, 0x6, 0x0, 0x8400) [ 3091.396092] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3091.409441] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3091.421475] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000000100)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) 11:05:10 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x5a000000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:10 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x38a, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3091.594177] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3091.594393] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3091.622792] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:10 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1fffff, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:10 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xb4010000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:10 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x21, &(0x7f00000002c0)="fb33914c", 0x4) 11:05:10 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x328}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3091.706899] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3091.785986] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3091.797659] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:10 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000080)={'veth1_to_bridge\x00', @ifru_data=&(0x7f0000000040)="164513c13cd626529dd325dd1017ac830d759c1c1e1b2f3c020993f983ed8de0"}) 11:05:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@RTM_GETNSID={0x1c, 0x5a, 0xc13, 0x0, 0x0, {}, [@NETNSA_NSID={0x8}]}, 0x1c}}, 0x0) 11:05:10 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x84, 0x71, 0x0, 0x0) [ 3091.951446] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 11:05:10 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:10 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3c8, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:10 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x5a020000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:10 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xba010000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:10 executing program 1: r0 = socket$inet(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x42}}, 0x10) 11:05:10 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x340}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3092.176038] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:11 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000040), 0x10, &(0x7f0000000240)=[{&(0x7f0000000000)="0514cf1843d48449", 0x8}], 0x1}, 0x0) 11:05:11 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x84, 0x7b, 0x0, 0x0) 11:05:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xcc000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3092.416614] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3d4, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:11 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x62020000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:11 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000480)={'caif0\x00', &(0x7f0000000400)=@ethtool_gfeatures}) [ 3092.575411] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:11 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x2000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:11 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x366}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xd1000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3092.694976] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='.', 0x1) 11:05:11 executing program 1: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 11:05:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001700)=ANY=[@ANYBLOB="60120000", @ANYRES16=r1, @ANYBLOB="01002bbd7000fddbdf250a"], 0x1260}}, 0x0) 11:05:11 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x66030000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:11 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3093.000792] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3f3, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xd4030000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3093.055363] netlink: 4684 bytes leftover after parsing attributes in process `syz-executor.1'. 11:05:11 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x385}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3093.099506] netlink: 4684 bytes leftover after parsing attributes in process `syz-executor.1'. 11:05:12 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x84, 0x78, 0x0, 0x0) 11:05:12 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000000)={'caif0\x00', @ifru_flags}) 11:05:12 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_TIOCINQ(r0, 0x890d, 0x0) 11:05:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x38a}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000180)=""/151, 0x26, 0x97, 0x1}, 0x20) 11:05:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3fa, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001780)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x10}], 0x10}, 0x200000c2) 11:05:12 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x6c000000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xda030000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:12 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)='v', 0x1}], 0x1, 0x0, 0x140}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:05:12 executing program 1: perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:05:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x10, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/225, 0x32, 0xe1, 0x8}, 0x20) 11:05:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3fc, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x3d4}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:12 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x8, 0x7, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:05:12 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x80ffffff, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xf3030000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:13 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x15, 0x1, &(0x7f0000000080)=@raw=[@exit={0x95, 0x0, 0x0, 0x6f020000}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:05:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x5000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x3da}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:13 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:05:13 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x85030000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:13 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x500, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:13 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000003c0)='[', 0x1}], 0x1}, 0x0) 11:05:13 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xf8010000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:13 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x7, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x48}, 0x78) 11:05:13 executing program 1: socketpair$unix(0x1, 0x0, 0xd5, &(0x7f0000000300)) 11:05:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x6000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x3f3}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000180)=""/215, 0x35, 0xd7, 0x1}, 0x20) 11:05:13 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xffff1f00}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:13 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x600, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:13 executing program 1: socketpair$unix(0x1, 0x0, 0xc0, &(0x7f0000000300)) [ 3095.014992] Bluetooth: hci5: command 0x0406 tx timeout 11:05:14 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x8a030000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x1}, {}]}, @fwd={0x2}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/239, 0x4b, 0xef, 0x1}, 0x20) 11:05:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x7000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x500}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000cc0)={0x0, 0xfffffffffffffce7, &(0x7f0000000c00)=[{&(0x7f0000000700)}, {0x0}, {0x0}, {&(0x7f0000000a00), 0xffffffae}, {0x0}, {&(0x7f0000000280)="d433fc09fb8fe28bc04231a0968f9c"}], 0x6}, 0x0) 11:05:14 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xffffff7f}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:14 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x700, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:14 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xa4020000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x600}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x8000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:14 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xffffff80}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:14 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xa8000000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:14 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1002, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3096.136040] secmark_tg_check: 46 callbacks suppressed [ 3096.136054] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3096.146538] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3096.156377] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:15 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xad000000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x700}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:15 executing program 1: socketpair(0x2, 0x2, 0x11, &(0x7f0000000440)) [ 3096.212487] xt_ct_set_helper: 22 callbacks suppressed [ 3096.212495] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3096.225499] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3096.229831] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:15 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x100000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xc, [@enum={0x9}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f0000000200)=""/194, 0x30, 0xc2, 0x1}, 0x20) 11:05:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x10020000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1602, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3096.430167] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3096.441465] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3096.451544] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:15 executing program 1: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000001c0)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700)=r0, 0x4) 11:05:15 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) 11:05:15 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xb0010000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3096.701526] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3096.701749] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3096.723178] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3096.736566] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1002}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3096.771035] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x14030000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:15 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000040)={@multicast1=0xe0000011, @local}, 0xc) [ 3096.923072] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:15 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) connect$inet(r0, 0x0, 0x48) 11:05:16 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xb4010000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1e01, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3097.176945] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8942, &(0x7f0000000280)={'ip6gre0\x00', 0x0}) 11:05:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1403}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x100000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x16020000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3097.392381] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x28, 0x7, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 11:05:16 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x5, &(0x7f0000000840)={@multicast1}, 0xc) [ 3097.557771] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:16 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xba010000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:16 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000000)=@ethtool_dump={0x40}}) 11:05:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x200000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x2803, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3097.797141] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:16 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000200)={@local, @multicast, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "53fc9b", 0x0, "d55132"}}}}}}, 0x0) 11:05:16 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 11:05:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1e010000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1602}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:16 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@dev}, 0x14) 11:05:16 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xcc000000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3098.105061] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:17 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@random="6f1a19878559", @broadcast, @val={@void}, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xffff, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @sack={0x5, 0x2}, @generic={0x0, 0x2}, @mptcp=@remove_addr={0x1e, 0x3}]}}}}}}}, 0x0) 11:05:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x300000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x20000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000006d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000006dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000007100)=@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x80) 11:05:17 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3001, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x400000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:17 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xd1000000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1e01}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x28010000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:17 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3101, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x500000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:17 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xd4030000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x2000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x28030000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:18 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0xffffffffffffffa0) 11:05:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3f00, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:18 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xda030000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:18 executing program 1: timer_create(0x4622d895e4323cc0, 0x0, &(0x7f0000000140)) 11:05:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000021c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000070760000080013"], 0x1c}}, 0x0) 11:05:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x2801}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:18 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x600000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000003300)={0x2020}, 0x2020) 11:05:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x31010000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:18 executing program 1: setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, "3de24e376b3e7ab92990aa240559a19760f51749fcb2a465da925e40a5a7159f437fc3183b61e987e3c5c5dd2b1258308dd454ce7ce34561be8c5244b24cde70c666ba13f3a327d7e66a980a7fc05783"}, 0xd8) r0 = socket(0xa, 0x3, 0x3f) sendmmsg$unix(r0, &(0x7f0000000600)=[{&(0x7f0000000080)=@abs, 0x6e, 0x0}], 0x4924924924924c6, 0x0) 11:05:18 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xf3030000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:18 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000087c0)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 11:05:18 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000040)={@local, @remote, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "c01817", 0x10, 0x21, 0x0, @local, @local, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "791b98", 0x0, "0f5d52"}}}}}}}, 0x0) 11:05:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4a00, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3f000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:18 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x700000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:18 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xf8010000, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x2803}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3100.158112] dccp_invalid_packet: P.type (REQUEST) not Data || [Data]Ack, while P.X == 0 [ 3100.194683] dccp_invalid_packet: P.type (REQUEST) not Data || [Data]Ack, while P.X == 0 11:05:19 executing program 1: clock_gettime(0x1, &(0x7f0000000780)) 11:05:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x34002001, &(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @empty}, 0x80) 11:05:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x14, 0x0, &(0x7f0000000000)) 11:05:19 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4a02, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x3101}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:19 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x800000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x40030000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:19 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xffff1f00, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) 11:05:19 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4e00, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:19 executing program 1: r0 = socket(0xa, 0x3, 0x6) sendmmsg$unix(r0, &(0x7f0000004840)=[{&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000100)="2dc0d68d98af7317771357ab2387c2fcd9ff8cb6", 0x14}], 0x1}], 0x1, 0x0) 11:05:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000040)) 11:05:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002180)='/proc/sysvipc/shm\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004a80)={0x2020}, 0x2020) 11:05:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x3f00}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:19 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0xffffff80, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:19 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000004ac0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r0, 0xc00464be, &(0x7f0000001040)) 11:05:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x5a00, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3101.145259] secmark_tg_check: 47 callbacks suppressed [ 3101.145267] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1002000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x48010000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:20 executing program 1: prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x1d) [ 3101.260366] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3101.308644] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:20 executing program 1: syz_emit_ethernet(0x82, &(0x7f0000000240)={@random="6f1a19878559", @broadcast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x18, 0x10, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_smc={0xfe, 0x6}, @generic={0x0, 0x4, 'kn'}, @mptcp=@remove_addr={0x1e, 0x23, 0x0, 0x0, "b0739f157d59656d5d757434e5471944add4d2cdde48f600a6a363665cd2eeb4"}, @md5sig={0x13, 0x12, "7f0a673472922f9a40ee15f6e9556598"}]}}}}}}}, 0x0) 11:05:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4003}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3101.481375] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3101.481511] xt_ct_set_helper: 23 callbacks suppressed [ 3101.481544] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3101.505989] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000001900)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000018c0)={&(0x7f0000000140)={0x1060, 0x1, 0x5, 0x0, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "0856db099f3c23d2fe112147993b55b3e81411fb25f019e2ca2190632702c408", "f84defc7c01a34d8fa4952d556337c407057779d2e5f67cd199fd63d6c06e4a9"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "88c200187af452f8365a2c61d103f5b02e9deebeb066ba10f9e12db6e92f005a", "bb8fac4d2f3b3eca820dcb78e5c4431f7d9128ec9fccb0bc699d8f7c182bd72b"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "a0f14d18326620e5ec2026140f41caa3856642c846fcdfdc101e9fbc0102fee0", "e9b296f86e2b7b99c302b53c984d36f24ea5eb6ee68588acbe0224b55aa8fdee"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "33d896f0e2259ae5adde35c9448e3d4df62af36a8a2238cbf16b8ec2b0313d8b", "5e25db87962af610ce38a3e0550a90ad5c644f835bb50a36af47700874976d55"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "24b78c851a9230810fb110363583096fc8a1cbf913a0fc9ff0bcf780b182c4aa", "a8f483dd06f5c9e41c619f45a7d0b1e28d9d01a687b41f0d01a09fd952c2dafe"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "e26af88c5169e41802f19c2cdcde820da81d621c64baa7ccc0f0b260641fca33", "63e9d3e281be37f9d93b7a55ab48ad92b3488d44eb5f4461e3b390cd9967f7df"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "8ee43146036bc28460644b0de463ce89eba8fb7c2a1c41316fada8ef1bc4ef08", "00308d5bfa1e9a92370a56216c5241806754b22121d77f160d5231b98569a80d"}}}]}, 0x1060}}, 0x0) 11:05:20 executing program 1: clock_gettime(0x8, &(0x7f0000000780)) 11:05:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000540)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) 11:05:20 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3101.643065] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x6202, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3101.687867] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3101.711017] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4a010000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3101.752641] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 3101.775337] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) getpeername$inet6(r0, 0x0, &(0x7f0000000080)) [ 3101.982516] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3101.984312] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3101.994037] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3102.023668] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1403000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:20 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000000b80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000340)=""/154, 0x9a}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)='c', 0x1}], 0x1}, 0x0) 11:05:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4801}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:20 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x2, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x36) [ 3102.163145] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3102.163338] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3102.182435] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3102.186845] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4e000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x6400, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4a01}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:21 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x3, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1602000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3102.406278] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3102.410825] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:21 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 11:05:21 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x4b67, &(0x7f0000000040)={0x1ff}) 11:05:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x6c02, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:21 executing program 1: syz_mount_image$iso9660(&(0x7f00000007c0), &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaad81, &(0x7f00000005c0)=[{&(0x7f0000000180)="ed44252afb186d16f51c0b12bde7e1146db10d1c4700913ed7e0e212618ba837cff69dbb6e995e6988a812bde44d1fea9b2c75a3f0e8eed69090b321d040df38f85508050055ba032ea4b0481696fc4903900fabbd10eef79a68597fb24f882d0db5ddc988917c93581f04425741019e00fe47c007858f58c710fa3b1a5b05259f9c", 0x82, 0x401}, {&(0x7f0000000240)="825e0ad7c5799fe8a64d659adeb22b76e2c437a930dd0d3c2a787c0aa1d05058fe6f340565501070f0a3bb968f0f959878ede0ae84c88381a6ada20701900da7b180da9ff35937578721a6e023f6550fa34ee27855fcecc730f577ddb30e2710d5045151d4b92be2f7c99ff39faa80c76d2b2f3d36b876d6b735043c0ef5ae89b85648c9d5ae628b9c30629dc38bda52e3fc921b38c2dc5dc5908ea2089ac7f908cd45167b44efbc13ff509fc019b18973a1db2e1ca7d7d14b97b298a5c2c9ec521ff488d190c74bbccc40794ee05006888d76be", 0xd4, 0x3}, {&(0x7f0000000340)="de130a80cf45d072788918e125d46428d968726295f25dd30a342a91ab7ec662b798e9550fe5", 0xfffffffffffffd82, 0x5}, {&(0x7f0000000380)="24a3d1a70fa0919e420aab2e6a158b711ebeaf643d2c80b5285f7f6a51be20ac5216c9e3e4a17e76c6ebc38d6945343b72f48a4f6df9f14c6d8e6ff39d8f64ef00ad9f9a9e872b1bf07bde68a03e9636f0995af1efbc07c2d24398ba28cead46211417b85d259aba4fe8870914aff0deca9f110d62c720056f3f701d29a864192830dc0df080dd864100252a442b319df3cbdcd93a93b3ae6c4930a981c8ce219858a7", 0xa3, 0x10000}, {&(0x7f0000000440)="208fc19885371a6083ffc536dc521d271b09b4687474a88809e630e5ded57b779354fe8f47d439566e6aec63c46f6e8b2cc73ac287de196ec391621084207a3f7cbda660a0359c67b43948299d77e02678fb96728994a4795dd5d5b351dab4d807f532fa24372f2fada6fea686005000000078ccf1", 0xfffffffffffffff7, 0x74}, {&(0x7f0000000500)="a5c0cd08", 0x4, 0xff}, {&(0x7f0000000800)="f883e3167ef32d67c89395933a6350c8e921b42c605cae7afa53a4e23f263c83563439a41b33ea8709edc998350ad8be9d1fb988ad7d992984eded59241fe1828636a0", 0x43, 0xb34}], 0x1080d, &(0x7f0000000680)={[{@nocompress}, {@dmode}, {@sbsector}, {@map_off}, {@check_relaxed}]}) fork() 11:05:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4e00}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:21 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x4, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1e01000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x52000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x7e00, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:22 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x5200}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:22 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x2000000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:22 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x7, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x5a000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:22 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x5a00}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:22 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x8a03, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:22 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004f40)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="dda016e826a338a6534b716e414aa81d46a20f5ec18112cef8305312107ae150aad3d2effcf65e817a1565d225db2fe5d639dc6446833e3d6ec9627e8652c603c38e013f8b5fa2d378e446d27b040d32069116b76ab312fb39a5b870146a88ede3089c47da505d5d5a281502fe61f16324e2a4df15", 0x75}, {&(0x7f0000000140)="8f7449cde61fc7caccbbacca9cea30290cb4811a8cb326", 0x17}, {&(0x7f00000002c0)="05b4a7c5108da9c18732af2ce99bd87e4fd81b7d33f5a63523ec9767c77c84476c7759f7525337bb7a1442b2b2bdc3c14171d0dd72083a8083b25b2fa73a58dce1df662262cd560e89a45fbe6631b0c2dc90970fd55a4820d94ed05894297b87ba12d13288f453b3a4489da29310215d0b8343604703db4d3abb27cf48efe1c3bcfe6f4fd6d453ef86cce01ea2d5b926db5aa2e773", 0x95}, {&(0x7f0000001080)="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", 0x48c}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x2, 0x8000) 11:05:22 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x2801000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:22 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x8, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0005de80255ed406dc60b107b218b927d4", 0x11) 11:05:23 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xb001, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:23 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x2803000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x5a02}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x5a020000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:23 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1, 0x0, 0x0) 11:05:23 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x4e, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:23 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000000)={0x29}) 11:05:23 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x3101000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x6000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x60000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:23 executing program 1: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8906, 0x0) 11:05:23 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xc402, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:23 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x52, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:23 executing program 1: r0 = socket(0x11, 0x3, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)=@abs, 0x6e) 11:05:23 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/ram4', 0x0, 0x0) 11:05:24 executing program 1: prctl$PR_SET_CHILD_SUBREAPER(0x3, 0x0) 11:05:24 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x5a, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x6202}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:24 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x3f00000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:24 executing program 1: r0 = timerfd_create(0x9, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) timerfd_settime(r0, 0x0, &(0x7f0000000340)={{0x77359400}, {0x0, r1+10000000}}, &(0x7f0000000380)) 11:05:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x62020000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:24 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xc601, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:24 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x6c, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:24 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0xc0481273, 0x0) 11:05:24 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000340)={{0x77359400}}, &(0x7f0000000380)) 11:05:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x66030000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:24 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xc803, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x6603}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:24 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4003000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:24 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x401070ca, 0x0) 11:05:24 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2285, 0x0) 11:05:24 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0xa8, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:24 executing program 1: r0 = getpgrp(0x0) r1 = socket$packet(0x11, 0x2, 0x300) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r1, &(0x7f0000000000)) 11:05:25 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$sock_timeval(r0, 0x1, 0x7, 0x0, &(0x7f0000000040)) 11:05:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x6c000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:25 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0x40603d07, &(0x7f0000000100)) 11:05:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xd100, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3106.321008] secmark_tg_check: 48 callbacks suppressed [ 3106.321017] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3106.333992] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3106.345135] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4801000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x6c00}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:25 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) [ 3106.435899] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:25 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0xad, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3106.496181] xt_ct_set_helper: 21 callbacks suppressed [ 3106.496200] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:25 executing program 1: clock_gettime(0x0, 0xfffffffffffffffd) 11:05:25 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000000)) 11:05:25 executing program 1: clock_adjtime(0x0, &(0x7f0000000300)) [ 3106.730438] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3106.743676] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3106.759063] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3106.767466] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3106.776089] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4a01000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x8503}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x80ffffff, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:25 executing program 1: syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x4800) [ 3106.880751] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xd403, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:25 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0xcc, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3106.936379] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000002080), 0x804, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000020c0)=[0x0, 0x95]) [ 3107.166291] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3107.322943] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3107.331464] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3107.334845] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x85030000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:26 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0xd1, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3107.424942] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3107.425143] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000012c0), 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, 0x0) 11:05:26 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xea00, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4e00000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x8a03}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:26 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x102, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3107.632459] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:26 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$sock_timeval(r0, 0x1, 0x2, 0x0, &(0x7f0000000040)) 11:05:26 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) [ 3107.860246] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:26 executing program 1: process_vm_writev(0x0, &(0x7f00000023c0)=[{&(0x7f0000002100)=""/243, 0xf3}], 0x1, &(0x7f00000025c0)=[{0x0}], 0x1, 0x0) 11:05:26 executing program 1: r0 = getpgid(0x0) process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/11, 0xb}], 0x1, &(0x7f0000000500)=[{&(0x7f0000000080)=""/175, 0xaf}], 0x1, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:05:26 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xf000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x8a030000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:26 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x11e, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xa402}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:26 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$sock_timeval(r0, 0x1, 0x2d, 0x0, &(0x7f0000000040)) 11:05:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x5200000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xf303, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:27 executing program 1: clone(0x0, &(0x7f0000000240)="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", 0x0, &(0x7f0000001280), 0x0) clone(0x40024000, &(0x7f0000000100), 0x0, &(0x7f0000000080), 0x0) 11:05:27 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x128, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xa4020000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3108.489947] IPVS: ftp: loaded support on port[0] = 21 11:05:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xf801, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:27 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x131, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:27 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0x40383d0c, &(0x7f0000000100)) 11:05:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xa8000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x5a00000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:27 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xa800}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:27 executing program 1: pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_setup(0x9, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000200)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 11:05:28 executing program 1: prctl$PR_SET_MM(0x3a, 0x0, &(0x7f0000fff000/0x1000)=nil) 11:05:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xad00}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xfa03, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:28 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x5a02000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:28 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x148, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xad000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x3fc, 0x0) flock(r0, 0x1) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x8) 11:05:28 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x6000000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xb401}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xfc03, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:28 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f0000000040)) 11:05:28 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x14a, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:28 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, @none, 0x1}, 0xe) 11:05:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xb4010000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x6202000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:29 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x84781, 0x0) 11:05:29 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x1b0, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x40000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:29 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) write$evdev(r0, 0x0, 0x0) 11:05:29 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x1b4, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xba01}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xba010000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000000)=""/84) 11:05:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x100000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x6603000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:29 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x1ba, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:29 executing program 1: syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x42a40) 11:05:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xcc000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xcc00}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:30 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x1f8, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:30 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/module/tcp_cubic', 0x101840, 0x0) [ 3111.377995] secmark_tg_check: 41 callbacks suppressed [ 3111.378002] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3111.390913] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:30 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000000)={0x4, 0x7}) 11:05:30 executing program 1: io_submit(0x0, 0x2000000000000108, &(0x7f0000000340)) [ 3111.543329] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3111.551194] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3111.551786] xt_ct_set_helper: 26 callbacks suppressed [ 3111.551792] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:30 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/anycast6\x00') 11:05:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x6c00000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3111.639306] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3111.639540] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3111.672533] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1fffff, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xd1000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:30 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REGISTER_BEACONS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r0, 0x7108f520756f0507, 0x0, 0x0, {{}, {@void, @void, @void}}}, 0x14}}, 0x0) 11:05:30 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x201, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xd100}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3111.807615] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xd403}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:30 executing program 1: socket$inet(0x2, 0x801, 0x0) 11:05:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x80ffffff00000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3111.996686] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3111.996870] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3112.004638] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3112.012272] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3112.022301] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:31 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001340)='/sys/kernel/uevent_helper', 0x0, 0x0) write$evdev(r0, 0x0, 0x0) 11:05:31 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x210, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3112.269434] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:31 executing program 1: sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0xb63e11568c8217ab) 11:05:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@in={0x2, 0x4e22, @local}, 0x80, 0x0, 0x0, &(0x7f00000012c0)=[{0x10}], 0x10}}], 0x1, 0x0) 11:05:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_timeval(r0, 0x1, 0x28, 0x0, &(0x7f0000000080)) 11:05:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xda03}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xd4030000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3112.546727] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:31 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x216, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x8503000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:31 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000001340)='/sys/kernel/uevent_helper', 0x4000, 0x0) [ 3112.703244] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:31 executing program 1: pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) unshare(0x48060400) [ 3112.888164] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3112.937680] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xf303}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3112.983758] IPVS: ftp: loaded support on port[0] = 21 11:05:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x2000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x8a03000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xf801}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3113.156920] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:32 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x25a, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xda030000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:32 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x2030000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xa402000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:32 executing program 1: pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x4]}, 0x8}) 11:05:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xa800000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:32 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x262, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x40000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:32 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xf3030000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:32 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4) 11:05:32 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x2a4, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:33 executing program 1: r0 = socket(0x1, 0x1, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000300)) 11:05:33 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xad00000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:33 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x300, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xf8010000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x100000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x2, 0xf, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, [@sadb_spirange={0x2}, @sadb_spirange={0x2}]}, 0x30}}, 0x0) 11:05:33 executing program 1: r0 = socket(0xa, 0x3, 0x9) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) 11:05:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_buf(r0, 0x29, 0xca, 0x0, &(0x7f00000000c0)) 11:05:33 executing program 1: syz_open_dev$rtc(&(0x7f0000000000), 0x3, 0x0) 11:05:33 executing program 1: timer_create(0x3, 0x0, &(0x7f00000040c0)) 11:05:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xb401000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1fffff}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x5000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005f40)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000001440)=ANY=[@ANYBLOB="b4120000150001"], 0x12b4}], 0x1}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000680), r0) 11:05:34 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x314, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xffff1f00, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040), 0x4) 11:05:34 executing program 1: pselect6(0x86, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x0, 0x1f}, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 11:05:34 executing program 1: r0 = socket(0xa, 0x3, 0x2) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 11:05:34 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x328, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xba01000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xffffff7f, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x6000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:34 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') 11:05:34 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='uid_map\x00') 11:05:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000340)={0x0, 0x9, &(0x7f00000002c0)="d39d164bb232656cea"}) 11:05:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xcc00000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:34 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x340, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x7000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:35 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x2000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f00000002c0)="16b3bfd9e1e794ddf790bd02388cb8d1274d3b5648580811a6fed3ace7889edff5745140a30da8e87892cc24ce71f27cd593b8532568102c2f0955deb7954d59e08e877eade94a1aef6405b8dd84b1dea48a659e93c8dcc7927ec86c9935dd38f2a37de43b94c3d0d65d4dd368166abb64c5b6e5cd60a5949f2e80c597135f41e49e67d099c27945aa5d368c088a2521", 0x90) 11:05:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xffffff80, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:35 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000080)=0xffffffffffffffff, 0x8) [ 3116.471569] secmark_tg_check: 43 callbacks suppressed [ 3116.471576] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3116.491458] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3116.505080] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:35 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x0, "23211442f05be857508411f9b4842555e87839cf9529909f5f28ecad5a569f2c41e8620992f3a6205dcc73b28763d4a5b56df4365ee729753cb9f01ed7bc3efc"}, 0x48, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x0, "23211442f05be857508411f9b4842555e87839cf9529909f5f28ecad5a569f2c41e8620992f3a6205dcc73b28763d4a5b56df4365ee729753cb9f01ed7bc3efc"}, 0x48, 0xffffffffffffffff) keyctl$link(0x8, r2, r1) keyctl$unlink(0x9, r0, r1) 11:05:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xd100000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3116.714940] xt_ct_set_helper: 22 callbacks suppressed [ 3116.714948] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3116.728382] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:35 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000800)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @dev}}}}], 0x28}, 0x0) [ 3116.755277] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0x1f8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:35 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x366, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3116.855223] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3116.870094] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x8000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:35 executing program 1: open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup2(r1, r0) r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x0) 11:05:35 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x3000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0x2000, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3117.083643] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xd403000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3117.122123] audit: type=1804 audit(1624791935.948:44): pid=20841 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir463750535/syzkaller.tAeUDy/739/file0" dev="sda1" ino=14980 res=1 [ 3117.146502] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3117.165067] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3117.174594] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:36 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000600), 0xffffffffffffffff) arch_prctl$ARCH_GET_GS(0x1004, 0x0) [ 3117.279667] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3117.280002] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:36 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x10020000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:36 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x385, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:36 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xda03000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001380)={&(0x7f00000007c0), 0xc, &(0x7f0000001340)={&(0x7f0000000e40)={0x14, 0x0, 0x1}, 0x14}}, 0x0) [ 3117.435119] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:36 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) connect$bt_sco(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000036c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000003680)={0x0}}, 0x50) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000003740), 0x0, 0x0) read$FUSE(r1, &(0x7f0000003780)={0x2020}, 0x2020) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000005b80)={0x0, 0x0, &(0x7f0000005b40)={0x0}}, 0x0) 11:05:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0xc7}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:36 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x16020000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xf303000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x0, @private}, {}, {0x2, 0x0, @remote}, 0x164}) 11:05:36 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x5000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:36 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x38a, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0xc8}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:36 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x3d4, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3117.944451] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(xchacha20-simd,sha256-ni)\x00'}, 0x58) 11:05:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x164}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1c7}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:37 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x6000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:37 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x1, @link_local, 'ip6erspan0\x00'}}, 0x1e) [ 3118.479111] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:37 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x1e010000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xf801000000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:37 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x3da, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000640)={0x20, 0x7, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz0\x00'}]}, 0x20}}, 0x0) 11:05:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1c8}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:37 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x7000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:37 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f0000001300)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private2, 0x8}, 0x1c, 0x0}, 0x0) 11:05:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x2000}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:37 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x19, &(0x7f0000000300)=ANY=[@ANYBLOB=' '], 0x290) 11:05:37 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f0000000700)={&(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1c}, 0x1c, 0x0}, 0x0) [ 3118.951283] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:37 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x3f3, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3119.132805] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x28030000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xffff1f0000000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:38 executing program 1: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setown(r0, 0x6, 0x0) 11:05:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x8000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:38 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x700, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3119.198262] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:38 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001500)=[{&(0x7f0000000000)="906ad2fcc9e5bb7baee254d0b4f6c25f7837b610c801f5290c0ee6a313022ee7d6d934d16ffd62036526d8a30d", 0x2d}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="9fc339f886f203646a345e043275640cb0b06a4be72608764a0e257f9d0a", 0x1e}, {&(0x7f0000000280)="6bfb39fa69736b5093ed5625bc7376129d1b09ed", 0x14}, {0x0}, {0x0}, {0x0}], 0x9) 11:05:38 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000080)={@local, @empty, @val, {@ipv4}}, 0x0) 11:05:38 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) 11:05:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x30010000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xffffff7f00000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x10020000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x2}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:38 executing program 1: socket$inet6(0x18, 0x3, 0x3) 11:05:38 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x1002, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:38 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x1403, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:38 executing program 1: renameat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0xffffffffffffffff, 0x0) 11:05:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x80001, 0x0) write$eventfd(r0, 0x0, 0x0) 11:05:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x31010000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x14030000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat(r0, &(0x7f00000004c0)='./file0\x00', r0, &(0x7f0000000500)='./file1\x00') 11:05:39 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x140, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x28802, 0x4c) 11:05:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0xffffffff00000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:39 executing program 1: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f00000000c0)=[{}], 0x1, 0x101, 0x0, 0x0) [ 3120.317467] audit: type=1804 audit(1624791939.148:45): pid=21258 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir463750535/syzkaller.tAeUDy/758/file0" dev="sda1" ino=15602 res=1 11:05:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x3}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x3f000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:39 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x1602, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:39 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x2001, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$cgroup_pid(r1, 0x0, 0x0) 11:05:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x0, 0x2}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x16020000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:39 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000080)) fstat(r0, &(0x7f0000000000)) 11:05:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4a000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:39 executing program 1: openat$incfs(0xffffffffffffff9c, &(0x7f00000003c0)='.log\x00', 0x124842, 0x1) 11:05:39 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x1e01, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3121.008034] audit: type=1800 audit(1624791939.838:46): pid=21320 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name=".log" dev="sda1" ino=15730 res=0 [ 3121.040858] audit: type=1800 audit(1624791939.838:47): pid=21320 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name=".log" dev="sda1" ino=15730 res=0 11:05:39 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x140, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x151) 11:05:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x1e010000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x4}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x0, 0x3}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:40 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f00000003c0)='.log\x00', 0x12c842, 0x0) write$P9_RLERRORu(r0, 0x0, 0x0) [ 3121.329022] audit: type=1800 audit(1624791940.158:48): pid=21367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name=".log" dev="sda1" ino=15880 res=0 11:05:40 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x2801, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') [ 3121.492786] audit: type=1800 audit(1624791940.218:49): pid=21367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name=".log" dev="sda1" ino=15880 res=0 11:05:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x5}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:40 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4a020000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3121.599874] secmark_tg_check: 44 callbacks suppressed [ 3121.599881] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3121.608664] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3121.633270] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3121.643362] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:40 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x20000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:40 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) futimesat(r0, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x2710}}) 11:05:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x0, 0x4}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) [ 3121.745333] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3121.752039] xt_ct_set_helper: 13 callbacks suppressed [ 3121.752072] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:40 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x2803, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:40 executing program 1: timer_create(0x0, 0x0, &(0x7f0000000140)) timer_settime(0x0, 0x1, &(0x7f00000001c0), 0x0) [ 3121.824661] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:40 executing program 1: fchownat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:05:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3122.040449] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3122.040701] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3122.048657] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3122.063951] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:40 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) 11:05:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x6}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x4e000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3122.098555] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3122.137217] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x28010000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3122.198114] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 11:05:41 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001c40)) 11:05:41 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x3101, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000300), 0xe) [ 3122.299728] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3122.325612] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x0, 0x5}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:41 executing program 1: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) 11:05:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x7}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x5a000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:41 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) 11:05:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x28030000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 3122.765699] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3122.776807] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:41 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x3f00, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x0, 0x6}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x31010000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x62020000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3123.090363] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3123.103014] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:41 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x8}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:42 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x4003, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x0, 0x7}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:42 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/power_supply', 0x0, 0x66) 11:05:42 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x4801, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x4e}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:42 executing program 1: mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x8072, 0xffffffffffffffff, 0x0) 11:05:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x3f000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x0, 0x8}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x64000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:42 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) 11:05:42 executing program 1: r0 = eventfd2(0x0, 0x0) r1 = dup2(r0, r0) write$cgroup_type(r1, &(0x7f0000000080), 0x9) 11:05:42 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x488000, 0x0) 11:05:42 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000280)) 11:05:43 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x0, 0x4e}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x6c020000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x4a01, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x40030000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x5c, r1, 0x403, 0x0, 0x0, {{}, {@void, @val={0x29}}}, [@NL80211_ATTR_IFTYPE={0x8}, @NL80211_ATTR_MESH_ID={0xa}, @mon_options=[@NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "4fd5e1f135dadd135f15c0f964af8db50f3235bc0c981ad9"}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}]]}, 0x5c}}, 0x0) 11:05:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x52}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x7e000000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3124.441991] netlink: 'syz-executor.1': attribute type 153 has an invalid length. [ 3124.486204] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3124.518472] netlink: 'syz-executor.1': attribute type 153 has an invalid length. 11:05:43 executing program 1: keyctl$reject(0x2, 0x0, 0x0, 0x8001, 0x0) 11:05:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x4e00, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3124.537439] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 11:05:43 executing program 1: timer_create(0x0, 0x0, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x77359400}}, 0x0) clock_gettime(0x0, &(0x7f0000000680)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f00000006c0)={{0x0, 0x989680}, {r0, r1+60000000}}, &(0x7f0000000700)) 11:05:43 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x0, 0x52}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:43 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x801c581f, 0x0) 11:05:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x48010000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x5a}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x5200, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:43 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in=@loopback}, {@in=@private, 0x0, 0x32}, @in6=@local, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x50, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x20, 0x80, "8d507b2f"}}]}, 0x140}}, 0x0) 11:05:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x80ffffff, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:44 executing program 1: syz_open_dev$vcsa(&(0x7f0000000180), 0x6, 0x0) 11:05:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) 11:05:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x8a030000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x60}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:51 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x5a00, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) 11:05:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x0, 0x5a}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:53 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4a010000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xb0010000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) [ 3136.837264] xt_ct_set_helper: 14 callbacks suppressed [ 3136.837270] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3138.998251] secmark_tg_check: 37 callbacks suppressed [ 3138.998259] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3139.588839] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3140.560069] xt_CT: You must specify a L4 protocol and not use inversions on it 11:05:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x6c}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:59 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x0, 0x60}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 11:05:59 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x5a02, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0xc4020000, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='wg0\x00'}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) 11:05:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0, 0x0, {0x4e000000}}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 11:05:59 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x5a02, 0xa8, 0xd0}, {0x28}}}}, 0x540) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) [ 3140.886393] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3140.920535] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3140.929412] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3141.279217] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3141.305894] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3141.317173] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3141.333737] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3141.334356] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 3144.133924] ieee802154 phy0 wpan0: encryption failed: -22 [ 3144.139620] ieee802154 phy1 wpan1: encryption failed: -22 [ 3144.296831] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3144.306179] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3144.314241] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3144.321177] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3144.330920] device bridge_slave_1 left promiscuous mode [ 3144.337316] bridge0: port 2(bridge_slave_1) entered disabled state [ 3144.344919] device bridge_slave_0 left promiscuous mode [ 3144.350407] bridge0: port 1(bridge_slave_0) entered disabled state [ 3144.359591] device veth1_macvtap left promiscuous mode [ 3144.366796] device veth0_macvtap left promiscuous mode [ 3144.373781] device veth1_vlan left promiscuous mode [ 3144.378875] device veth0_vlan left promiscuous mode [ 3147.341275] Bluetooth: hci0: command 0x0409 tx timeout [ 3148.704761] device hsr_slave_1 left promiscuous mode [ 3148.712524] device hsr_slave_0 left promiscuous mode [ 3148.729308] team0 (unregistering): Port device team_slave_1 removed [ 3148.738654] team0 (unregistering): Port device team_slave_0 removed [ 3148.748739] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3148.759633] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3148.790949] bond0 (unregistering): Released all slaves [ 3148.807491] IPVS: ftp: loaded support on port[0] = 21 [ 3148.889593] chnl_net:caif_netlink_parms(): no params data found [ 3148.960892] bridge0: port 1(bridge_slave_0) entered blocking state [ 3148.967471] bridge0: port 1(bridge_slave_0) entered disabled state [ 3148.976125] device bridge_slave_0 entered promiscuous mode [ 3148.983680] bridge0: port 2(bridge_slave_1) entered blocking state [ 3148.990205] bridge0: port 2(bridge_slave_1) entered disabled state [ 3148.998261] device bridge_slave_1 entered promiscuous mode [ 3149.028182] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3149.038130] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3149.061781] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3149.069421] team0: Port device team_slave_0 added [ 3149.076533] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3149.085176] team0: Port device team_slave_1 added [ 3149.105740] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3149.112770] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3149.139334] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3149.152363] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3149.158605] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3149.186575] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3149.198302] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3149.207886] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3149.232867] device hsr_slave_0 entered promiscuous mode [ 3149.238886] device hsr_slave_1 entered promiscuous mode [ 3149.246578] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3149.255136] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3149.358932] bridge0: port 2(bridge_slave_1) entered blocking state [ 3149.365419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3149.372145] bridge0: port 1(bridge_slave_0) entered blocking state [ 3149.378521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3149.413784] Bluetooth: hci0: command 0x041b tx timeout [ 3149.449479] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3149.465520] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3149.482667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3149.490438] bridge0: port 1(bridge_slave_0) entered disabled state [ 3149.503935] bridge0: port 2(bridge_slave_1) entered disabled state [ 3149.519150] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3149.525689] 8021q: adding VLAN 0 to HW filter on device team0 [ 3149.537576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3149.546567] bridge0: port 1(bridge_slave_0) entered blocking state [ 3149.553066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3149.571796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3149.579513] bridge0: port 2(bridge_slave_1) entered blocking state [ 3149.585909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3149.602523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3149.618738] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3149.627674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3149.637076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3149.650309] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3149.662741] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3149.668811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3149.677774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3149.700610] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3149.709351] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3149.720272] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3149.733363] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3149.750894] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3149.762722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3149.827891] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3149.838125] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3149.848801] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3149.860666] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3149.870924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3149.884826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3149.898002] device veth0_vlan entered promiscuous mode [ 3149.905994] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3149.914039] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3149.925723] device veth1_vlan entered promiscuous mode [ 3149.934481] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 3149.948234] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 3149.967859] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3149.985598] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3149.995305] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3150.005857] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3150.016296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3150.029116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3150.042901] device veth0_macvtap entered promiscuous mode [ 3150.049320] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3150.066121] device veth1_macvtap entered promiscuous mode [ 3150.077718] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3150.093608] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3150.104872] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3150.114818] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3150.126016] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3150.136688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3150.149775] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3150.160193] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3150.170126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3150.179555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3150.189495] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3150.198679] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3150.209150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3150.219714] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3150.226819] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3150.236099] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3150.243780] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3150.250870] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3150.259167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3150.269279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3150.279652] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3150.288834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3150.298990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3150.320561] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3150.331080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3150.340188] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3150.349950] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3150.359128] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3150.368889] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3150.379232] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3150.386469] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3150.393982] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3150.402373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3150.522972] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 3150.529310] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3150.551217] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3150.555199] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 3150.566044] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3150.573386] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3150.573619] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3150.590345] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 3152.981107] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3152.987870] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3153.002687] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3153.009404] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3153.021283] device bridge_slave_1 left promiscuous mode [ 3153.026745] bridge0: port 2(bridge_slave_1) entered disabled state [ 3153.036034] device bridge_slave_0 left promiscuous mode [ 3153.041578] bridge0: port 1(bridge_slave_0) entered disabled state [ 3153.050360] device veth1_macvtap left promiscuous mode [ 3153.055953] device veth0_macvtap left promiscuous mode [ 3153.061460] device veth1_vlan left promiscuous mode [ 3153.066537] device veth0_vlan left promiscuous mode [ 3156.130800] Bluetooth: hci0: command 0x0409 tx timeout [ 3157.376093] device hsr_slave_1 left promiscuous mode [ 3157.384255] device hsr_slave_0 left promiscuous mode [ 3157.399938] team0 (unregistering): Port device team_slave_1 removed [ 3157.411719] team0 (unregistering): Port device team_slave_0 removed [ 3157.423898] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3157.434050] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3157.465157] bond0 (unregistering): Released all slaves [ 3157.483169] IPVS: ftp: loaded support on port[0] = 21 [ 3157.589691] chnl_net:caif_netlink_parms(): no params data found [ 3157.693983] bridge0: port 1(bridge_slave_0) entered blocking state [ 3157.706725] bridge0: port 1(bridge_slave_0) entered disabled state [ 3157.714735] device bridge_slave_0 entered promiscuous mode [ 3157.727403] bridge0: port 2(bridge_slave_1) entered blocking state [ 3157.734366] bridge0: port 2(bridge_slave_1) entered disabled state [ 3157.748370] device bridge_slave_1 entered promiscuous mode [ 3157.777120] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3157.792360] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3157.828933] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3157.836939] team0: Port device team_slave_0 added [ 3157.848516] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3157.856536] team0: Port device team_slave_1 added [ 3157.883643] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3157.889896] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3157.921675] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3157.938389] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3157.946061] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3157.977400] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3157.988776] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3158.001891] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3158.038661] device hsr_slave_0 entered promiscuous mode [ 3158.045616] device hsr_slave_1 entered promiscuous mode [ 3158.056804] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3158.065175] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3158.202677] bridge0: port 2(bridge_slave_1) entered blocking state [ 3158.209183] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3158.215869] bridge0: port 1(bridge_slave_0) entered blocking state [ 3158.222317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3158.229855] Bluetooth: hci0: command 0x041b tx timeout [ 3158.296147] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3158.305961] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3158.323296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3158.334513] bridge0: port 1(bridge_slave_0) entered disabled state [ 3158.341289] bridge0: port 2(bridge_slave_1) entered disabled state [ 3158.352089] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3158.359796] 8021q: adding VLAN 0 to HW filter on device team0 [ 3158.372242] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3158.379918] bridge0: port 1(bridge_slave_0) entered blocking state [ 3158.386348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3158.411778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3158.419499] bridge0: port 2(bridge_slave_1) entered blocking state [ 3158.425915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3158.436674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3158.455402] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3158.463600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3158.472569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3158.480102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3158.491565] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3158.497696] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3158.522312] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3158.535504] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3158.542290] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3158.548976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3158.566777] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3158.588220] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3158.609680] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 3158.617768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3158.626096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3158.657660] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3158.665851] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3158.672903] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3158.682699] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3158.689365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3158.698108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3158.706982] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3158.714364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3158.723097] device veth0_vlan entered promiscuous mode [ 3158.735170] device veth1_vlan entered promiscuous mode [ 3158.741431] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 3158.751786] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 3158.764785] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3158.774219] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3158.781311] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3158.788443] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3158.796016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3158.804155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3158.814584] device veth0_macvtap entered promiscuous mode [ 3158.821375] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3158.829521] device veth1_macvtap entered promiscuous mode [ 3158.837211] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3158.847080] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3158.856735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3158.865529] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3158.875717] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3158.884904] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3158.894742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3158.904408] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3158.914161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3158.923833] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3158.935018] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3158.944249] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3158.954456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3158.964881] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3158.972285] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3158.979489] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3158.986941] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3158.994349] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3159.002267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3159.012812] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3159.022856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3159.032028] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3159.041784] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3159.050957] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3159.060755] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3159.069856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3159.079594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3159.088831] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3159.110484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3159.122738] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3159.131733] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3159.140288] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3159.148688] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3159.269391] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 3159.277063] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3159.297007] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3159.320196] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3159.331045] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 3159.337901] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3159.346394] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3159.353921] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 3161.858626] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3161.865478] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3161.874005] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3161.880746] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3161.888279] device bridge_slave_1 left promiscuous mode [ 3161.893990] bridge0: port 2(bridge_slave_1) entered disabled state [ 3161.901460] device bridge_slave_0 left promiscuous mode [ 3161.908085] bridge0: port 1(bridge_slave_0) entered disabled state [ 3161.918722] device veth1_macvtap left promiscuous mode [ 3161.924131] device veth0_macvtap left promiscuous mode [ 3161.929494] device veth1_vlan left promiscuous mode [ 3161.934753] device veth0_vlan left promiscuous mode [ 3164.780167] Bluetooth: hci0: command 0x0409 tx timeout [ 3166.218090] device hsr_slave_1 left promiscuous mode [ 3166.228010] device hsr_slave_0 left promiscuous mode [ 3166.240704] team0 (unregistering): Port device team_slave_1 removed [ 3166.253117] team0 (unregistering): Port device team_slave_0 removed [ 3166.262536] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3166.274326] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3166.303235] bond0 (unregistering): Released all slaves [ 3166.323643] IPVS: ftp: loaded support on port[0] = 21 [ 3166.409503] chnl_net:caif_netlink_parms(): no params data found [ 3166.484172] bridge0: port 1(bridge_slave_0) entered blocking state [ 3166.492688] bridge0: port 1(bridge_slave_0) entered disabled state [ 3166.507844] device bridge_slave_0 entered promiscuous mode [ 3166.516756] bridge0: port 2(bridge_slave_1) entered blocking state [ 3166.527359] bridge0: port 2(bridge_slave_1) entered disabled state [ 3166.536049] device bridge_slave_1 entered promiscuous mode [ 3166.569000] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3166.579614] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3166.609080] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3166.623223] team0: Port device team_slave_0 added [ 3166.628999] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3166.639268] team0: Port device team_slave_1 added [ 3166.669598] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3166.678611] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3166.709157] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3166.729062] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3166.735604] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3166.767094] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3166.787119] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3166.800058] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3166.836979] device hsr_slave_0 entered promiscuous mode [ 3166.843386] device hsr_slave_1 entered promiscuous mode [ 3166.849673] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3166.859935] Bluetooth: hci0: command 0x041b tx timeout [ 3166.870976] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3166.986902] bridge0: port 2(bridge_slave_1) entered blocking state [ 3166.993305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3167.000003] bridge0: port 1(bridge_slave_0) entered blocking state [ 3167.006367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3167.068333] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3167.083762] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3167.099310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3167.108253] bridge0: port 1(bridge_slave_0) entered disabled state [ 3167.120449] bridge0: port 2(bridge_slave_1) entered disabled state [ 3167.133219] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3167.139291] 8021q: adding VLAN 0 to HW filter on device team0 [ 3167.150524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3167.158208] bridge0: port 1(bridge_slave_0) entered blocking state [ 3167.164727] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3167.178380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3167.188261] bridge0: port 2(bridge_slave_1) entered blocking state [ 3167.194706] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3167.216812] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3167.243001] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3167.251554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3167.259122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3167.268168] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3167.278299] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3167.285364] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3167.301864] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3167.310026] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3167.316735] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3167.339004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3167.362137] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3167.377595] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 3167.384886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3167.398292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3167.465229] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3167.478032] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3167.485772] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3167.498618] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3167.506173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3167.514256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3167.522595] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3167.529680] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3167.538288] device veth0_vlan entered promiscuous mode [ 3167.548037] device veth1_vlan entered promiscuous mode [ 3167.554564] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 3167.563138] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 3167.576695] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3167.585573] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3167.592475] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3167.600398] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3167.607622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3167.616069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3167.626415] device veth0_macvtap entered promiscuous mode [ 3167.633243] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3167.641830] device veth1_macvtap entered promiscuous mode [ 3167.648008] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3167.657632] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3167.667711] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3167.676576] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3167.686595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3167.696157] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3167.705923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3167.715194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3167.725064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3167.734302] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3167.744172] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3167.753349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3167.763991] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3167.779551] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3167.787586] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3167.795567] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3167.805676] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3167.813383] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3167.821314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3167.831651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3167.842747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3167.852877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3167.862915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3167.872370] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3167.882323] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3167.892152] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3167.902548] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3167.911980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3167.922187] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3167.933008] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3167.940463] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3167.948897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3167.957195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3168.074614] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 3168.082470] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3168.089588] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3168.128440] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3168.138312] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 3168.145748] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3168.152938] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3168.159651] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 3170.609084] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3170.615990] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3170.624664] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3170.631511] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3170.639032] device bridge_slave_1 left promiscuous mode [ 3170.644824] bridge0: port 2(bridge_slave_1) entered disabled state [ 3170.652531] device bridge_slave_0 left promiscuous mode [ 3170.657962] bridge0: port 1(bridge_slave_0) entered disabled state [ 3170.668940] device veth1_macvtap left promiscuous mode [ 3170.674284] device veth0_macvtap left promiscuous mode [ 3170.679705] device veth1_vlan left promiscuous mode [ 3170.684756] device veth0_vlan left promiscuous mode [ 3173.649479] Bluetooth: hci0: command 0x0409 tx timeout [ 3174.914177] device hsr_slave_1 left promiscuous mode [ 3174.921607] device hsr_slave_0 left promiscuous mode [ 3174.938103] team0 (unregistering): Port device team_slave_1 removed [ 3174.947240] team0 (unregistering): Port device team_slave_0 removed [ 3174.957233] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3174.968466] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3174.998185] bond0 (unregistering): Released all slaves [ 3175.015964] IPVS: ftp: loaded support on port[0] = 21 [ 3175.114345] chnl_net:caif_netlink_parms(): no params data found [ 3175.204410] bridge0: port 1(bridge_slave_0) entered blocking state [ 3175.211987] bridge0: port 1(bridge_slave_0) entered disabled state [ 3175.225253] device bridge_slave_0 entered promiscuous mode [ 3175.232900] bridge0: port 2(bridge_slave_1) entered blocking state [ 3175.240600] bridge0: port 2(bridge_slave_1) entered disabled state [ 3175.247943] device bridge_slave_1 entered promiscuous mode [ 3175.278331] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3175.292935] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3175.327071] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3175.337347] team0: Port device team_slave_0 added [ 3175.347734] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3175.358239] team0: Port device team_slave_1 added [ 3175.388718] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3175.396818] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3175.428546] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3175.447165] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3175.454167] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3175.480715] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3175.492596] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3175.502239] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3175.528632] device hsr_slave_0 entered promiscuous mode [ 3175.534528] device hsr_slave_1 entered promiscuous mode [ 3175.542060] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3175.550493] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3175.674797] bridge0: port 2(bridge_slave_1) entered blocking state [ 3175.681209] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3175.687863] bridge0: port 1(bridge_slave_0) entered blocking state [ 3175.694279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3175.734844] Bluetooth: hci0: command 0x041b tx timeout [ 3175.766122] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3175.781921] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3175.798743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3175.806541] bridge0: port 1(bridge_slave_0) entered disabled state [ 3175.820151] bridge0: port 2(bridge_slave_1) entered disabled state [ 3175.837961] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3175.845913] 8021q: adding VLAN 0 to HW filter on device team0 [ 3175.862845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3175.873044] bridge0: port 1(bridge_slave_0) entered blocking state [ 3175.879439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3175.891607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3175.907410] bridge0: port 2(bridge_slave_1) entered blocking state [ 3175.913871] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3175.943150] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3175.957254] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3175.984932] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3175.997395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3176.006320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3176.021053] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3176.027074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3176.058655] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3176.068299] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3176.079140] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3176.087162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3176.104360] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3176.125554] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3176.151618] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 3176.158629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3176.172515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3176.200425] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3176.207446] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3176.215345] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3176.225349] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3176.232279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3176.242019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3176.250939] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3176.258011] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3176.267824] device veth0_vlan entered promiscuous mode [ 3176.277389] device veth1_vlan entered promiscuous mode [ 3176.283536] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 3176.292221] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 3176.305517] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3176.314210] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3176.321102] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3176.328224] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3176.335935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3176.343732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3176.355088] device veth0_macvtap entered promiscuous mode [ 3176.361842] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3176.370288] device veth1_macvtap entered promiscuous mode [ 3176.376274] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3176.387228] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3176.396519] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3176.405885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3176.415689] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3176.425073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3176.434986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3176.444165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3176.454115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3176.463683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3176.473424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3176.482615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3176.492527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3176.502988] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3176.510796] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3176.517896] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3176.525186] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3176.532822] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3176.540793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3176.550554] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3176.560953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3176.570137] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3176.580027] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3176.589203] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3176.598899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3176.608061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3176.617943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3176.627131] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3176.636955] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3176.648589] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3176.657411] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3176.668653] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3176.676863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3176.802941] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 3176.815753] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3176.838589] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 3176.845132] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3176.848599] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3176.855807] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3176.865017] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3176.873063] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 3179.334541] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3179.341699] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3179.350064] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3179.356774] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3179.365719] device bridge_slave_1 left promiscuous mode [ 3179.372043] bridge0: port 2(bridge_slave_1) entered disabled state [ 3179.379865] device bridge_slave_0 left promiscuous mode [ 3179.385292] bridge0: port 1(bridge_slave_0) entered disabled state [ 3179.394502] device veth1_macvtap left promiscuous mode [ 3179.399889] device veth0_macvtap left promiscuous mode [ 3179.405190] device veth1_vlan left promiscuous mode [ 3179.410426] device veth0_vlan left promiscuous mode [ 3182.048796] Bluetooth: hci2: command 0x0406 tx timeout [ 3182.288915] Bluetooth: hci0: command 0x0409 tx timeout [ 3183.670373] device hsr_slave_1 left promiscuous mode [ 3183.677839] device hsr_slave_0 left promiscuous mode [ 3183.691539] team0 (unregistering): Port device team_slave_1 removed [ 3183.705558] team0 (unregistering): Port device team_slave_0 removed [ 3183.716085] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3183.726146] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3183.756393] bond0 (unregistering): Released all slaves [ 3183.773214] IPVS: ftp: loaded support on port[0] = 21 [ 3183.867309] chnl_net:caif_netlink_parms(): no params data found [ 3183.944122] bridge0: port 1(bridge_slave_0) entered blocking state [ 3183.951927] bridge0: port 1(bridge_slave_0) entered disabled state [ 3183.964093] device bridge_slave_0 entered promiscuous mode [ 3183.972794] bridge0: port 2(bridge_slave_1) entered blocking state [ 3183.983545] bridge0: port 2(bridge_slave_1) entered disabled state [ 3183.992228] device bridge_slave_1 entered promiscuous mode [ 3184.026619] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3184.038508] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3184.072919] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3184.082247] team0: Port device team_slave_0 added [ 3184.088045] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3184.102239] team0: Port device team_slave_1 added [ 3184.132463] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3184.141693] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3184.172423] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3184.186020] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3184.197020] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3184.228455] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3184.245666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3184.253725] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3184.291317] device hsr_slave_0 entered promiscuous mode [ 3184.297180] device hsr_slave_1 entered promiscuous mode [ 3184.309090] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3184.316307] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3184.368898] Bluetooth: hci0: command 0x041b tx timeout [ 3184.452155] bridge0: port 2(bridge_slave_1) entered blocking state [ 3184.458629] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3184.465317] bridge0: port 1(bridge_slave_0) entered blocking state [ 3184.471711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3184.521241] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3184.531118] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3184.541759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3184.550279] bridge0: port 1(bridge_slave_0) entered disabled state [ 3184.557116] bridge0: port 2(bridge_slave_1) entered disabled state [ 3184.573662] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3184.580103] 8021q: adding VLAN 0 to HW filter on device team0 [ 3184.595715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3184.604159] bridge0: port 1(bridge_slave_0) entered blocking state [ 3184.610565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3184.635929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3184.649970] bridge0: port 2(bridge_slave_1) entered blocking state [ 3184.656309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3184.680326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3184.688240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3184.696938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3184.708165] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3184.719669] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3184.725681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3184.733030] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3184.740321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3184.762588] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3184.776534] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3184.782987] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3184.795816] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3184.808063] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3184.833950] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3184.845612] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 3184.857938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3184.868200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3184.930435] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3184.937668] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3184.946069] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3184.957020] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3184.964605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3184.974381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3184.982718] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3184.990191] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3184.999845] device veth0_vlan entered promiscuous mode [ 3185.010099] device veth1_vlan entered promiscuous mode [ 3185.015973] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 3185.025816] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 3185.037533] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3185.047960] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3185.055034] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3185.062602] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3185.069971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3185.077519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3185.087630] device veth0_macvtap entered promiscuous mode [ 3185.098299] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3185.106911] device veth1_macvtap entered promiscuous mode [ 3185.113326] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3185.122018] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3185.133755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3185.143050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3185.153003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3185.162468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3185.172373] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3185.181660] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3185.191542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3185.201327] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3185.211124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3185.220393] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3185.230477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3185.240573] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3185.247494] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3185.257109] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3185.265248] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3185.273307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3185.281732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3185.292986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3185.303659] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3185.314164] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3185.324756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3185.334530] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3185.344903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3185.354499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3185.365398] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3185.374929] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3185.385095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3185.395679] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3185.404144] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3185.412620] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3185.420938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3185.542559] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 3185.549477] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3185.556671] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3185.591241] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3185.602703] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 3185.609588] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3185.616687] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3185.624567] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 3188.076862] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3188.083653] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3188.093683] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3188.100851] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3188.110699] device bridge_slave_1 left promiscuous mode [ 3188.116187] bridge0: port 2(bridge_slave_1) entered disabled state [ 3188.124124] device bridge_slave_0 left promiscuous mode [ 3188.130014] bridge0: port 1(bridge_slave_0) entered disabled state [ 3188.139271] device veth1_macvtap left promiscuous mode [ 3188.144582] device veth0_macvtap left promiscuous mode [ 3188.150026] device veth1_vlan left promiscuous mode [ 3188.155080] device veth0_vlan left promiscuous mode [ 3191.088200] Bluetooth: hci0: command 0x0409 tx timeout [ 3192.421382] device hsr_slave_1 left promiscuous mode [ 3192.429805] device hsr_slave_0 left promiscuous mode [ 3192.443726] team0 (unregistering): Port device team_slave_1 removed [ 3192.457929] team0 (unregistering): Port device team_slave_0 removed [ 3192.467338] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3192.478153] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3192.511031] bond0 (unregistering): Released all slaves [ 3192.529886] IPVS: ftp: loaded support on port[0] = 21 [ 3192.630952] chnl_net:caif_netlink_parms(): no params data found [ 3192.707736] bridge0: port 1(bridge_slave_0) entered blocking state [ 3192.715755] bridge0: port 1(bridge_slave_0) entered disabled state [ 3192.724859] device bridge_slave_0 entered promiscuous mode [ 3192.732701] bridge0: port 2(bridge_slave_1) entered blocking state [ 3192.739510] bridge0: port 2(bridge_slave_1) entered disabled state [ 3192.746987] device bridge_slave_1 entered promiscuous mode [ 3192.772035] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3192.781989] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3192.804414] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3192.812899] team0: Port device team_slave_0 added [ 3192.819074] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3192.828554] team0: Port device team_slave_1 added [ 3192.849040] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3192.855285] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3192.881026] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3192.893078] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3192.899740] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3192.925250] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3192.938391] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3192.945933] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3192.970345] device hsr_slave_0 entered promiscuous mode [ 3192.976527] device hsr_slave_1 entered promiscuous mode [ 3192.994021] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3193.001392] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3193.125618] bridge0: port 2(bridge_slave_1) entered blocking state [ 3193.132039] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3193.138776] bridge0: port 1(bridge_slave_0) entered blocking state [ 3193.145144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3193.171623] Bluetooth: hci0: command 0x041b tx timeout [ 3193.212783] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3193.221898] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3193.234377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3193.242797] bridge0: port 1(bridge_slave_0) entered disabled state [ 3193.253279] bridge0: port 2(bridge_slave_1) entered disabled state [ 3193.268767] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3193.275353] 8021q: adding VLAN 0 to HW filter on device team0 [ 3193.286518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3193.295358] bridge0: port 1(bridge_slave_0) entered blocking state [ 3193.301760] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3193.329098] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3193.336778] bridge0: port 2(bridge_slave_1) entered blocking state [ 3193.343182] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3193.352337] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3193.360891] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3193.374522] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3193.382067] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3193.398669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3193.409319] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3193.415341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3193.432557] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3193.442306] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3193.455905] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3193.473727] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3193.496124] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3193.507130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3193.574489] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3193.588824] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3193.595746] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3193.611709] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3193.623219] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3193.631491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3193.647077] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3193.655420] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3193.670793] device veth0_vlan entered promiscuous mode [ 3193.680347] device veth1_vlan entered promiscuous mode [ 3193.686131] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 3193.696736] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 3193.715184] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3193.726576] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3193.739675] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3193.749204] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3193.756632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3193.767823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3193.777721] device veth0_macvtap entered promiscuous mode [ 3193.784782] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3193.793823] device veth1_macvtap entered promiscuous mode [ 3193.800452] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3193.809866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3193.821688] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3193.830176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3193.840299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3193.849761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3193.859704] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3193.869352] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3193.879300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3193.889001] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3193.898966] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3193.909128] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3193.919403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3193.930204] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3193.937147] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3193.944902] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3193.952638] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3193.960204] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3193.968597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3193.978711] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3193.988551] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3193.997642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3194.008608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3194.017717] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3194.027778] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3194.036990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3194.047414] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3194.057591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3194.067353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3194.077988] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3194.084882] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3194.092224] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3194.100789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3194.221013] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 3194.230131] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3194.237566] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3194.260632] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 3194.267427] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3194.275607] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3194.289818] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3194.296596] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 3196.662638] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3196.669539] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3196.677098] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3196.684779] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3196.695430] device bridge_slave_1 left promiscuous mode [ 3196.701371] bridge0: port 2(bridge_slave_1) entered disabled state [ 3196.708642] device bridge_slave_0 left promiscuous mode [ 3196.714060] bridge0: port 1(bridge_slave_0) entered disabled state [ 3196.724379] device veth1_macvtap left promiscuous mode [ 3196.729734] device veth0_macvtap left promiscuous mode [ 3196.735032] device veth1_vlan left promiscuous mode [ 3196.742443] device veth0_vlan left promiscuous mode [ 3199.727588] Bluetooth: hci0: command 0x0409 tx timeout [ 3200.980254] device hsr_slave_1 left promiscuous mode [ 3200.988507] device hsr_slave_0 left promiscuous mode [ 3201.003993] team0 (unregistering): Port device team_slave_1 removed [ 3201.017463] team0 (unregistering): Port device team_slave_0 removed [ 3201.026884] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3201.039847] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3201.067580] bond0 (unregistering): Released all slaves [ 3201.081890] IPVS: ftp: loaded support on port[0] = 21 [ 3201.196428] chnl_net:caif_netlink_parms(): no params data found [ 3201.279708] bridge0: port 1(bridge_slave_0) entered blocking state [ 3201.286207] bridge0: port 1(bridge_slave_0) entered disabled state [ 3201.294319] device bridge_slave_0 entered promiscuous mode [ 3201.302151] bridge0: port 2(bridge_slave_1) entered blocking state [ 3201.308994] bridge0: port 2(bridge_slave_1) entered disabled state [ 3201.316425] device bridge_slave_1 entered promiscuous mode [ 3201.339589] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3201.349193] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3201.371426] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3201.380301] team0: Port device team_slave_0 added [ 3201.386036] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3201.393957] team0: Port device team_slave_1 added [ 3201.413958] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3201.420901] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3201.446858] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3201.459132] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3201.465464] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3201.491424] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3201.502787] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3201.510774] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3201.535146] device hsr_slave_0 entered promiscuous mode [ 3201.541509] device hsr_slave_1 entered promiscuous mode [ 3201.548198] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3201.555354] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3201.671890] bridge0: port 2(bridge_slave_1) entered blocking state [ 3201.678289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3201.684939] bridge0: port 1(bridge_slave_0) entered blocking state [ 3201.691334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3201.756790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3201.772480] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3201.789200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3201.797155] bridge0: port 1(bridge_slave_0) entered disabled state [ 3201.807442] Bluetooth: hci0: command 0x041b tx timeout [ 3201.812975] bridge0: port 2(bridge_slave_1) entered disabled state [ 3201.831831] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3201.840582] 8021q: adding VLAN 0 to HW filter on device team0 [ 3201.856905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3201.866757] bridge0: port 1(bridge_slave_0) entered blocking state [ 3201.873164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3201.904527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3201.912810] bridge0: port 2(bridge_slave_1) entered blocking state [ 3201.919225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3201.943641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3201.956929] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3201.973931] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3201.984768] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3201.995759] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3202.002868] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3202.010528] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3202.019018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3202.026724] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3202.044170] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3202.053497] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3202.062564] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3202.077929] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3202.095502] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3202.106120] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 3202.114825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3202.124792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3202.190093] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3202.197297] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3202.205677] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3202.216643] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3202.224588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3202.233414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3202.244634] device veth0_vlan entered promiscuous mode [ 3202.257239] device veth1_vlan entered promiscuous mode [ 3202.264713] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 3202.272724] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3202.281890] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3202.289354] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3202.299413] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 3202.314124] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3202.324420] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3202.331374] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3202.340677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3202.349456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3202.359541] device veth0_macvtap entered promiscuous mode [ 3202.366264] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3202.376836] device veth1_macvtap entered promiscuous mode [ 3202.383377] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3202.393255] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3202.404310] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3202.414034] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3202.424295] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3202.433810] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3202.443609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3202.452978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3202.463207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3202.472641] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3202.482685] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3202.492538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3202.502375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3202.512629] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3202.519824] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3202.526700] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3202.534196] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3202.542230] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3202.550556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3202.562614] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3202.572557] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3202.581750] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3202.591526] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3202.600686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3202.610599] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3202.619976] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3202.629797] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3202.639074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3202.648871] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3202.660034] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3202.667044] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3202.674937] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3202.682921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3202.813179] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 3202.825703] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3202.844413] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3202.856253] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3202.868083] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 3202.874440] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3202.883674] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3202.892814] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 3205.335548] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3205.342789] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3205.351325] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3205.358355] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3205.365871] device bridge_slave_1 left promiscuous mode [ 3205.372107] bridge0: port 2(bridge_slave_1) entered disabled state [ 3205.379404] device bridge_slave_0 left promiscuous mode [ 3205.384850] bridge0: port 1(bridge_slave_0) entered disabled state [ 3205.394426] device veth1_macvtap left promiscuous mode [ 3205.399801] device veth0_macvtap left promiscuous mode [ 3205.405104] device veth1_vlan left promiscuous mode [ 3205.410380] device veth0_vlan left promiscuous mode [ 3205.578488] ieee802154 phy0 wpan0: encryption failed: -22 [ 3205.584049] ieee802154 phy1 wpan1: encryption failed: -22 [ 3208.367018] Bluetooth: hci0: command 0x0409 tx timeout [ 3209.709865] device hsr_slave_1 left promiscuous mode [ 3209.718596] device hsr_slave_0 left promiscuous mode [ 3209.730767] team0 (unregistering): Port device team_slave_1 removed [ 3209.741664] team0 (unregistering): Port device team_slave_0 removed [ 3209.752323] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3209.763429] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3209.793016] bond0 (unregistering): Released all slaves [ 3209.809606] IPVS: ftp: loaded support on port[0] = 21 [ 3209.912375] chnl_net:caif_netlink_parms(): no params data found [ 3209.994755] bridge0: port 1(bridge_slave_0) entered blocking state [ 3210.001993] bridge0: port 1(bridge_slave_0) entered disabled state [ 3210.010898] device bridge_slave_0 entered promiscuous mode [ 3210.019647] bridge0: port 2(bridge_slave_1) entered blocking state [ 3210.026054] bridge0: port 2(bridge_slave_1) entered disabled state [ 3210.035043] device bridge_slave_1 entered promiscuous mode [ 3210.058062] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3210.068743] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3210.091777] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3210.099952] team0: Port device team_slave_0 added [ 3210.105713] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3210.115995] team0: Port device team_slave_1 added [ 3210.137345] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3210.143647] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3210.172532] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3210.185311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3210.192504] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3210.220431] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3210.232447] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3210.240879] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3210.266632] device hsr_slave_0 entered promiscuous mode [ 3210.273584] device hsr_slave_1 entered promiscuous mode [ 3210.283902] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3210.294496] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3210.430065] bridge0: port 2(bridge_slave_1) entered blocking state [ 3210.436432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3210.443246] bridge0: port 1(bridge_slave_0) entered blocking state [ 3210.449637] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3210.456419] Bluetooth: hci0: command 0x041b tx timeout [ 3210.541971] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3210.553775] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3210.571284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3210.582540] bridge0: port 1(bridge_slave_0) entered disabled state [ 3210.592522] bridge0: port 2(bridge_slave_1) entered disabled state [ 3210.608630] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3210.614700] 8021q: adding VLAN 0 to HW filter on device team0 [ 3210.632264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3210.645758] bridge0: port 1(bridge_slave_0) entered blocking state [ 3210.652175] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3210.683019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3210.693123] bridge0: port 2(bridge_slave_1) entered blocking state [ 3210.699521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3210.714241] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3210.735440] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3210.744335] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3210.758296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3210.769226] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3210.779716] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3210.785768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3210.797616] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3210.813289] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3210.822382] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3210.830406] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3210.837932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3210.850691] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3210.867736] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3210.878437] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 3210.885563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3210.894663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3210.961734] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3210.969748] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3210.977069] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3210.987861] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3210.994454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3211.002955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3211.013382] device veth0_vlan entered promiscuous mode [ 3211.021344] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3211.029419] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3211.040091] device veth1_vlan entered promiscuous mode [ 3211.046209] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 3211.059852] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 3211.071697] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3211.083963] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3211.091418] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3211.099728] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3211.107395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3211.115012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3211.125109] device veth0_macvtap entered promiscuous mode [ 3211.131838] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3211.140238] device veth1_macvtap entered promiscuous mode [ 3211.146300] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3211.155920] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3211.165716] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3211.175557] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3211.185624] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3211.194974] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3211.204834] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3211.214353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3211.224437] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3211.234026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3211.243909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3211.253282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3211.263323] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3211.273564] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3211.280924] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3211.287964] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3211.295212] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3211.302859] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3211.310838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3211.320789] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3211.331528] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3211.342224] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3211.353517] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3211.369886] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3211.380250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3211.389990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3211.400330] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3211.410144] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3211.420312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3211.430953] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3211.438391] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3211.445290] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3211.453839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3211.565924] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 3211.584910] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3211.597740] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3211.604558] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3211.645872] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 3211.653516] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3211.661901] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3211.669608] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 3214.131241] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3214.138588] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3214.146210] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3214.154011] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3214.162253] device bridge_slave_1 left promiscuous mode [ 3214.168209] bridge0: port 2(bridge_slave_1) entered disabled state [ 3214.175304] device bridge_slave_0 left promiscuous mode [ 3214.181160] bridge0: port 1(bridge_slave_0) entered disabled state [ 3214.190786] device veth1_macvtap left promiscuous mode [ 3214.196063] device veth0_macvtap left promiscuous mode [ 3214.201471] device veth1_vlan left promiscuous mode [ 3214.206604] device veth0_vlan left promiscuous mode [ 3217.166388] Bluetooth: hci0: command 0x0409 tx timeout [ 3218.505708] device hsr_slave_1 left promiscuous mode [ 3218.513212] device hsr_slave_0 left promiscuous mode [ 3218.530360] team0 (unregistering): Port device team_slave_1 removed [ 3218.540860] team0 (unregistering): Port device team_slave_0 removed [ 3218.551406] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3218.561837] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3218.593273] bond0 (unregistering): Released all slaves [ 3218.609580] IPVS: ftp: loaded support on port[0] = 21 [ 3218.692663] chnl_net:caif_netlink_parms(): no params data found [ 3218.778643] bridge0: port 1(bridge_slave_0) entered blocking state [ 3218.785277] bridge0: port 1(bridge_slave_0) entered disabled state [ 3218.793353] device bridge_slave_0 entered promiscuous mode [ 3218.801188] bridge0: port 2(bridge_slave_1) entered blocking state [ 3218.808752] bridge0: port 2(bridge_slave_1) entered disabled state [ 3218.817411] device bridge_slave_1 entered promiscuous mode [ 3218.841601] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3218.851516] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3218.874208] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3218.882270] team0: Port device team_slave_0 added [ 3218.888474] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3218.896023] team0: Port device team_slave_1 added [ 3218.918415] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3218.924690] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3218.952154] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3218.964678] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3218.971298] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3218.997288] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3219.009124] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3219.017516] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3219.044296] device hsr_slave_0 entered promiscuous mode [ 3219.050217] device hsr_slave_1 entered promiscuous mode [ 3219.057996] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3219.065171] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3219.160936] bridge0: port 2(bridge_slave_1) entered blocking state [ 3219.167353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3219.174027] bridge0: port 1(bridge_slave_0) entered blocking state [ 3219.180432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3219.228132] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3219.237489] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3219.246818] Bluetooth: hci0: command 0x041b tx timeout [ 3219.258469] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3219.264533] 8021q: adding VLAN 0 to HW filter on device team0 [ 3219.271604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3219.279440] bridge0: port 1(bridge_slave_0) entered disabled state [ 3219.286958] bridge0: port 2(bridge_slave_1) entered disabled state [ 3219.307462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3219.315153] bridge0: port 1(bridge_slave_0) entered blocking state [ 3219.321554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3219.331575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3219.340103] bridge0: port 2(bridge_slave_1) entered blocking state [ 3219.346538] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3219.367201] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3219.375099] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3219.390354] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3219.400576] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3219.411503] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3219.418899] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3219.426339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3219.434353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3219.451260] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3219.458050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3219.472071] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3219.478747] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3219.485454] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3219.501229] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3219.516228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3219.573991] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3219.581681] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3219.593439] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3219.615996] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3219.622749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3219.637382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3219.645024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3219.656644] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3219.665166] device veth0_vlan entered promiscuous mode [ 3219.678607] device veth1_vlan entered promiscuous mode [ 3219.684751] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 3219.695339] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 3219.710527] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3219.720856] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3219.729193] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3219.737524] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3219.744866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3219.763937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3219.774675] device veth0_macvtap entered promiscuous mode [ 3219.781593] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3219.791595] device veth1_macvtap entered promiscuous mode [ 3219.799521] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3219.809531] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3219.821484] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3219.831105] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3219.841541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3219.850919] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3219.862639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3219.872027] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3219.881948] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3219.891427] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3219.901434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3219.910787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3219.920783] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3219.931836] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3219.938989] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3219.947502] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3219.954682] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3219.963429] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3219.971355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3219.986401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3219.996209] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3220.005300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3220.016037] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3220.025308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3220.035148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3220.044624] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3220.054477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3220.065215] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3220.074971] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3220.085184] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3220.092194] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3220.101203] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3220.109967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3220.251760] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 3220.258592] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3220.265700] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3220.293469] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3220.308131] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 3220.314377] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3220.322699] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3220.330058] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 3222.680071] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3222.687558] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3222.702905] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3222.709759] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3222.719386] device bridge_slave_1 left promiscuous mode [ 3222.727707] bridge0: port 2(bridge_slave_1) entered disabled state [ 3222.735306] device bridge_slave_0 left promiscuous mode [ 3222.742351] bridge0: port 1(bridge_slave_0) entered disabled state [ 3222.753714] device veth1_macvtap left promiscuous mode [ 3222.760020] device veth0_macvtap left promiscuous mode [ 3222.765381] device veth1_vlan left promiscuous mode [ 3222.771926] device veth0_vlan left promiscuous mode [ 3225.885777] Bluetooth: hci0: command 0x0409 tx timeout [ 3227.077283] device hsr_slave_1 left promiscuous mode [ 3227.084581] device hsr_slave_0 left promiscuous mode [ 3227.101612] team0 (unregistering): Port device team_slave_1 removed [ 3227.111668] team0 (unregistering): Port device team_slave_0 removed [ 3227.122389] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3227.134162] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3227.164323] bond0 (unregistering): Released all slaves [ 3227.181776] IPVS: ftp: loaded support on port[0] = 21 [ 3227.281230] chnl_net:caif_netlink_parms(): no params data found [ 3227.370278] bridge0: port 1(bridge_slave_0) entered blocking state [ 3227.378190] bridge0: port 1(bridge_slave_0) entered disabled state [ 3227.390121] device bridge_slave_0 entered promiscuous mode [ 3227.398774] bridge0: port 2(bridge_slave_1) entered blocking state [ 3227.405176] bridge0: port 2(bridge_slave_1) entered disabled state [ 3227.418367] device bridge_slave_1 entered promiscuous mode [ 3227.452212] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3227.463750] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3227.498181] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3227.509774] team0: Port device team_slave_0 added [ 3227.515509] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3227.525040] team0: Port device team_slave_1 added [ 3227.560175] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3227.570242] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3227.601402] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3227.614795] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3227.627427] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3227.660874] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3227.673256] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3227.685434] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3227.722699] device hsr_slave_0 entered promiscuous mode [ 3227.729660] device hsr_slave_1 entered promiscuous mode [ 3227.740512] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3227.750510] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3227.885331] bridge0: port 2(bridge_slave_1) entered blocking state [ 3227.891856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3227.898624] bridge0: port 1(bridge_slave_0) entered blocking state [ 3227.904987] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3227.965733] Bluetooth: hci0: command 0x041b tx timeout [ 3227.972165] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3227.984682] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3228.000959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3228.011983] bridge0: port 1(bridge_slave_0) entered disabled state [ 3228.020546] bridge0: port 2(bridge_slave_1) entered disabled state [ 3228.033526] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3228.041993] 8021q: adding VLAN 0 to HW filter on device team0 [ 3228.059793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3228.071260] bridge0: port 1(bridge_slave_0) entered blocking state [ 3228.077796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3228.096613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3228.104364] bridge0: port 2(bridge_slave_1) entered blocking state [ 3228.110784] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3228.128528] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3228.136634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3228.154098] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3228.167759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3228.180599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3228.191707] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3228.202437] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3228.232225] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3228.246830] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3228.253280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3228.261322] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3228.273527] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3228.292041] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3228.302743] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 3228.311271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3228.320023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3228.348408] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3228.357092] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3228.363678] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3228.373555] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3228.380722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3228.389559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3228.399211] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3228.406962] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3228.414928] device veth0_vlan entered promiscuous mode [ 3228.425274] device veth1_vlan entered promiscuous mode [ 3228.431571] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 3228.440715] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 3228.452304] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3228.461933] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3228.469108] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3228.476579] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3228.483653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3228.492001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3228.501928] device veth0_macvtap entered promiscuous mode [ 3228.508811] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3228.518106] device veth1_macvtap entered promiscuous mode [ 3228.524152] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3228.533725] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3228.543725] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3228.552685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3228.563435] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3228.573170] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3228.582957] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3228.592109] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3228.602184] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3228.611400] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3228.621811] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3228.630997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3228.640953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3228.651052] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3228.658400] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3228.667077] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3228.674362] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3228.681976] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3228.689888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3228.701381] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3228.711603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3228.720756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3228.730724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3228.739925] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3228.749713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3228.758890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3228.769187] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3228.778729] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3228.788551] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3228.799056] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3228.806040] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3228.813220] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3228.822073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3228.962946] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 3228.971975] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3228.987363] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3229.002312] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3229.021342] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 3229.028419] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3229.035943] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3229.042667] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 3231.520259] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3231.527615] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3231.537553] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3231.544225] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3231.552477] device bridge_slave_1 left promiscuous mode [ 3231.561240] bridge0: port 2(bridge_slave_1) entered disabled state [ 3231.568688] device bridge_slave_0 left promiscuous mode [ 3231.574129] bridge0: port 1(bridge_slave_0) entered disabled state [ 3231.585159] device veth1_macvtap left promiscuous mode [ 3231.590645] device veth0_macvtap left promiscuous mode [ 3231.596036] device veth1_vlan left promiscuous mode [ 3231.601203] device veth0_vlan left promiscuous mode [ 3234.525119] Bluetooth: hci0: command 0x0409 tx timeout [ 3235.885423] device hsr_slave_1 left promiscuous mode [ 3235.892761] device hsr_slave_0 left promiscuous mode [ 3235.909694] team0 (unregistering): Port device team_slave_1 removed [ 3235.918954] team0 (unregistering): Port device team_slave_0 removed [ 3235.929738] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3235.940209] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3235.971154] bond0 (unregistering): Released all slaves [ 3235.986435] IPVS: ftp: loaded support on port[0] = 21 [ 3236.094674] chnl_net:caif_netlink_parms(): no params data found [ 3236.199520] bridge0: port 1(bridge_slave_0) entered blocking state [ 3236.210990] bridge0: port 1(bridge_slave_0) entered disabled state [ 3236.220342] device bridge_slave_0 entered promiscuous mode [ 3236.232799] bridge0: port 2(bridge_slave_1) entered blocking state [ 3236.241058] bridge0: port 2(bridge_slave_1) entered disabled state [ 3236.254482] device bridge_slave_1 entered promiscuous mode [ 3236.292040] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3236.302913] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3236.338165] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3236.346238] team0: Port device team_slave_0 added [ 3236.351901] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3236.360982] team0: Port device team_slave_1 added [ 3236.381276] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3236.388422] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3236.415158] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3236.427831] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3236.434070] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3236.462013] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3236.473967] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3236.482411] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3236.513363] device hsr_slave_0 entered promiscuous mode [ 3236.521569] device hsr_slave_1 entered promiscuous mode [ 3236.535788] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3236.542932] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3236.605148] Bluetooth: hci0: command 0x041b tx timeout [ 3236.673147] bridge0: port 2(bridge_slave_1) entered blocking state [ 3236.679547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3236.686226] bridge0: port 1(bridge_slave_0) entered blocking state [ 3236.692588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3236.760500] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3236.771415] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3236.787943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3236.800221] bridge0: port 1(bridge_slave_0) entered disabled state [ 3236.808923] bridge0: port 2(bridge_slave_1) entered disabled state [ 3236.826133] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3236.832210] 8021q: adding VLAN 0 to HW filter on device team0 [ 3236.842959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3236.851076] bridge0: port 1(bridge_slave_0) entered blocking state [ 3236.857536] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3236.875765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3236.883459] bridge0: port 2(bridge_slave_1) entered blocking state [ 3236.889883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3236.912870] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3236.922852] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3236.933409] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3236.941005] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3236.949218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3236.958382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3236.966860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3236.974335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3236.981389] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3236.994407] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3237.002878] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3237.009952] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3237.017401] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3237.029340] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3237.046257] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3237.057215] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 3237.064523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3237.072991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3237.136845] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3237.144066] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3237.151710] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3237.161915] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3237.169246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3237.177042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3237.185293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3237.192177] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3237.205330] device veth0_vlan entered promiscuous mode [ 3237.217568] device veth1_vlan entered promiscuous mode [ 3237.223782] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 3237.235758] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 3237.250688] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3237.261170] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3237.271966] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3237.279920] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3237.287892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3237.296570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3237.307996] device veth0_macvtap entered promiscuous mode [ 3237.314189] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3237.323697] device veth1_macvtap entered promiscuous mode [ 3237.330277] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3237.339517] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3237.349515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3237.358601] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3237.369138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3237.378748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3237.388514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3237.397766] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3237.407538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3237.416736] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3237.426505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3237.435673] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3237.445457] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3237.455839] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3237.462774] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3237.471051] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3237.481395] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3237.497618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3237.508324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3237.520461] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3237.530581] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3237.541912] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3237.552060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3237.561329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3237.571623] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3237.580853] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3237.590683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3237.599866] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3237.609802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3237.620063] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3237.627505] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3237.634715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3237.642735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3237.767237] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 3237.773638] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3237.791029] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 3237.801764] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3237.814562] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3237.822021] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3237.834682] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3237.844953] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 2021/06/27 11:07:37 executor 1 failed 11 times: executor 1: exit status 67 SYZFAIL: mmap of output file failed (errno 9: Bad file descriptor) SYZFAIL: child failed (errno 0: Success) loop exited with status 67