[ 98.808031][ T39] audit: type=1400 audit(1578259990.647:41): avc: denied { map } for pid=8785 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '[localhost]:10392' (ECDSA) to the list of known hosts. [ 102.436416][ T39] audit: type=1400 audit(1578259994.277:42): avc: denied { map } for pid=8799 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16525 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2020/01/05 21:33:14 fuzzer started 2020/01/05 21:33:17 dialing manager at 10.0.2.10:33745 2020/01/05 21:33:17 syscalls: 2810 2020/01/05 21:33:17 code coverage: enabled 2020/01/05 21:33:17 comparison tracing: enabled 2020/01/05 21:33:17 extra coverage: enabled 2020/01/05 21:33:17 setuid sandbox: enabled 2020/01/05 21:33:17 namespace sandbox: enabled 2020/01/05 21:33:17 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/05 21:33:17 fault injection: enabled 2020/01/05 21:33:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/05 21:33:17 net packet injection: enabled 2020/01/05 21:33:17 net device setup: enabled 2020/01/05 21:33:17 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/01/05 21:33:17 devlink PCI setup: PCI device 0000:00:10.0 is not available 21:33:50 executing program 0: [ 139.333382][ T39] audit: type=1400 audit(1578260031.167:43): avc: denied { map } for pid=8822 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=20 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 21:33:51 executing program 1: 21:33:51 executing program 2: [ 139.901881][ T8825] IPVS: ftp: loaded support on port[0] = 21 [ 139.901887][ T8823] IPVS: ftp: loaded support on port[0] = 21 [ 139.947981][ T8827] IPVS: ftp: loaded support on port[0] = 21 21:33:51 executing program 3: [ 140.170538][ T8829] IPVS: ftp: loaded support on port[0] = 21 [ 140.395815][ T8827] chnl_net:caif_netlink_parms(): no params data found [ 140.478105][ T8825] chnl_net:caif_netlink_parms(): no params data found [ 140.520302][ T8823] chnl_net:caif_netlink_parms(): no params data found [ 140.594105][ T8827] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.619617][ T8827] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.675228][ T8827] device bridge_slave_0 entered promiscuous mode [ 140.733759][ T8827] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.754632][ T8827] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.774281][ T8827] device bridge_slave_1 entered promiscuous mode [ 140.853341][ T8825] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.867303][ T8825] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.881584][ T8825] device bridge_slave_0 entered promiscuous mode [ 140.905232][ T8823] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.940962][ T8823] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.980299][ T8823] device bridge_slave_0 entered promiscuous mode [ 141.013228][ T8829] chnl_net:caif_netlink_parms(): no params data found [ 141.061191][ T8827] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 141.100331][ T8825] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.121473][ T8825] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.149463][ T8825] device bridge_slave_1 entered promiscuous mode [ 141.179247][ T8823] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.206709][ T8823] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.239262][ T8823] device bridge_slave_1 entered promiscuous mode [ 141.281439][ T8827] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 141.359437][ T8827] team0: Port device team_slave_0 added [ 141.393591][ T8827] team0: Port device team_slave_1 added [ 141.417916][ T8825] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 141.566041][ T8829] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.582639][ T8829] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.600606][ T8829] device bridge_slave_0 entered promiscuous mode [ 141.626988][ T8825] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 141.647108][ T8823] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 141.670244][ T8829] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.681378][ T8829] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.692813][ T8829] device bridge_slave_1 entered promiscuous mode [ 141.713466][ T8823] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 141.785613][ T8827] device hsr_slave_0 entered promiscuous mode [ 141.863651][ T8827] device hsr_slave_1 entered promiscuous mode [ 141.958789][ T8825] team0: Port device team_slave_0 added [ 141.970850][ T8825] team0: Port device team_slave_1 added [ 141.983126][ T8823] team0: Port device team_slave_0 added [ 141.999752][ T8829] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 142.030755][ T8823] team0: Port device team_slave_1 added [ 142.044377][ T8829] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 142.155427][ T8825] device hsr_slave_0 entered promiscuous mode [ 142.223362][ T8825] device hsr_slave_1 entered promiscuous mode [ 142.292714][ T8825] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 142.307888][ T8825] Cannot create hsr debugfs directory [ 142.322015][ T8829] team0: Port device team_slave_0 added [ 142.339716][ T8829] team0: Port device team_slave_1 added [ 142.395088][ T8823] device hsr_slave_0 entered promiscuous mode [ 142.452961][ T8823] device hsr_slave_1 entered promiscuous mode [ 142.532753][ T8823] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 142.544927][ T8823] Cannot create hsr debugfs directory [ 142.744962][ T8829] device hsr_slave_0 entered promiscuous mode [ 142.813009][ T8829] device hsr_slave_1 entered promiscuous mode [ 142.872658][ T8829] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 142.886774][ T8829] Cannot create hsr debugfs directory [ 142.929302][ T39] audit: type=1400 audit(1578260034.767:44): avc: denied { create } for pid=8827 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 142.978779][ T39] audit: type=1400 audit(1578260034.767:45): avc: denied { write } for pid=8827 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 143.025067][ T39] audit: type=1400 audit(1578260034.777:46): avc: denied { read } for pid=8827 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 143.094884][ T8827] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 143.198532][ T8827] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 143.266942][ T8827] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 143.359383][ T8827] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 143.427965][ T8823] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 143.497092][ T8823] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 143.622314][ T8823] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 143.704326][ T8825] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 143.816254][ T8825] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 143.919671][ T8825] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 144.001752][ T8825] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 144.065727][ T8823] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 144.182121][ T8829] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 144.250081][ T8829] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 144.369103][ T8829] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 144.438827][ T8829] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 144.664244][ T8823] 8021q: adding VLAN 0 to HW filter on device bond0 [ 144.692015][ T8827] 8021q: adding VLAN 0 to HW filter on device bond0 [ 144.750329][ T8838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.780577][ T8838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.799622][ T8838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.836826][ T8838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.867642][ T8827] 8021q: adding VLAN 0 to HW filter on device team0 [ 144.887926][ T8823] 8021q: adding VLAN 0 to HW filter on device team0 [ 144.908204][ T8825] 8021q: adding VLAN 0 to HW filter on device bond0 [ 144.932090][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.947818][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.961530][ T8830] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.971499][ T8830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.987297][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.999486][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.010920][ T8830] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.019718][ T8830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.033056][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.044395][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.059728][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.075207][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.085143][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.093034][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.110041][ T8839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.127156][ T8839] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.144480][ T8839] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.160342][ T8839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.175865][ T8839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 145.212909][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.227242][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.243802][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 145.260851][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 145.287271][ T8825] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.309954][ T8829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.327459][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 145.345031][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 145.364767][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 145.392586][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 145.405390][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 145.420153][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 145.430885][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 145.443951][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.458465][ T3050] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.470247][ T3050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.481931][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.495168][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.507253][ T3050] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.516037][ T3050] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.541337][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 145.554511][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.566346][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 145.578092][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 145.590066][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 145.603887][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 145.623031][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 145.636068][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 145.647031][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.670758][ T3327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 145.683576][ T3327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.694247][ T3327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 145.706944][ T3327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 145.720043][ T3327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.731033][ T3327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 145.742756][ T3327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.755728][ T3327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.768596][ T3327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.792819][ T8839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 145.807370][ T8839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 145.820071][ T8839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 145.831080][ T8839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 145.842961][ T8839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 145.856959][ T8839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.871253][ T8839] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 145.894739][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 145.944578][ T8827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 145.965998][ T8829] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.986003][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.014620][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.074533][ T8825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.130807][ T3327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.161843][ T3327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.180193][ T3327] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.191605][ T3327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.207647][ T3327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.233089][ T3327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.265324][ T3327] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.283193][ T3327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.297070][ T3327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 146.327544][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.348916][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.373081][ T8838] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 146.395588][ T8838] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 146.428951][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 146.441669][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 146.457687][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 146.471758][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 146.491131][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.524422][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.553901][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 146.571172][ T8823] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 146.588707][ T8827] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 146.600858][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 146.614151][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 146.629220][ T8825] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 146.645263][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.667342][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.689639][ T8829] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 146.706603][ T8829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.729192][ T8839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.746821][ T8839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.773014][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 146.786519][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 146.803532][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 146.825463][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 146.883749][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 146.926685][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 146.950362][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 146.975468][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 146.999314][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.021194][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 147.049912][ T8829] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 147.075573][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 147.097287][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.119338][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.138179][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 147.163428][ T8827] device veth0_vlan entered promiscuous mode [ 147.181445][ T8823] device veth0_vlan entered promiscuous mode [ 147.207610][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 147.231390][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 147.281971][ T8827] device veth1_vlan entered promiscuous mode [ 147.309468][ T8823] device veth1_vlan entered promiscuous mode [ 147.338671][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 147.374030][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.410478][ T8825] device veth0_vlan entered promiscuous mode [ 147.434489][ T8825] device veth1_vlan entered promiscuous mode [ 147.465299][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.487357][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 147.501287][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 147.511880][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 147.551359][ T39] audit: type=1400 audit(1578260039.387:47): avc: denied { associate } for pid=8823 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 147.566057][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 147.614688][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 147.655141][ T8829] device veth0_vlan entered promiscuous mode [ 147.668903][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 147.681795][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.695929][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.715388][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 147.747269][ T8829] device veth1_vlan entered promiscuous mode 21:33:59 executing program 2: 21:33:59 executing program 1: 21:33:59 executing program 0: 21:33:59 executing program 1: 21:33:59 executing program 2: 21:33:59 executing program 0: 21:33:59 executing program 1: 21:33:59 executing program 3: 21:33:59 executing program 2: 21:33:59 executing program 0: 21:33:59 executing program 2: 21:33:59 executing program 1: 21:33:59 executing program 0: 21:34:00 executing program 3: 21:34:00 executing program 1: [ 148.163375][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 148.183113][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 21:34:00 executing program 2: 21:34:00 executing program 3: 21:34:00 executing program 1: 21:34:00 executing program 0: 21:34:00 executing program 2: 21:34:00 executing program 3: 21:34:00 executing program 1: 21:34:00 executing program 0: 21:34:00 executing program 3: 21:34:00 executing program 2: 21:34:00 executing program 0: 21:34:00 executing program 1: 21:34:00 executing program 3: 21:34:00 executing program 1: 21:34:00 executing program 0: 21:34:00 executing program 2: 21:34:00 executing program 3: 21:34:00 executing program 1: 21:34:00 executing program 0: 21:34:00 executing program 3: 21:34:00 executing program 1: 21:34:00 executing program 2: 21:34:00 executing program 0: 21:34:00 executing program 1: 21:34:00 executing program 3: 21:34:00 executing program 2: 21:34:00 executing program 1: 21:34:00 executing program 3: 21:34:00 executing program 0: 21:34:00 executing program 2: 21:34:00 executing program 1: 21:34:00 executing program 0: 21:34:00 executing program 3: 21:34:00 executing program 2: 21:34:00 executing program 1: 21:34:00 executing program 0: 21:34:00 executing program 2: 21:34:00 executing program 2: 21:34:00 executing program 1: 21:34:00 executing program 0: 21:34:00 executing program 3: 21:34:00 executing program 2: 21:34:00 executing program 0: 21:34:00 executing program 3: 21:34:00 executing program 1: 21:34:00 executing program 0: 21:34:00 executing program 2: 21:34:00 executing program 1: 21:34:00 executing program 3: 21:34:00 executing program 0: 21:34:00 executing program 2: 21:34:00 executing program 3: 21:34:00 executing program 1: 21:34:00 executing program 0: 21:34:00 executing program 2: 21:34:00 executing program 1: 21:34:00 executing program 3: 21:34:00 executing program 0: 21:34:00 executing program 1: 21:34:00 executing program 2: 21:34:00 executing program 3: 21:34:00 executing program 0: 21:34:00 executing program 3: 21:34:00 executing program 1: 21:34:00 executing program 0: 21:34:00 executing program 2: 21:34:00 executing program 1: 21:34:00 executing program 3: 21:34:00 executing program 0: 21:34:00 executing program 2: 21:34:00 executing program 1: 21:34:00 executing program 0: 21:34:00 executing program 3: 21:34:00 executing program 2: 21:34:01 executing program 1: 21:34:01 executing program 3: 21:34:01 executing program 0: 21:34:01 executing program 2: 21:34:01 executing program 0: 21:34:01 executing program 1: 21:34:01 executing program 3: 21:34:01 executing program 0: 21:34:01 executing program 2: 21:34:01 executing program 1: 21:34:01 executing program 3: 21:34:01 executing program 3: 21:34:01 executing program 0: 21:34:01 executing program 2: 21:34:01 executing program 1: 21:34:01 executing program 3: 21:34:01 executing program 0: 21:34:01 executing program 1: 21:34:01 executing program 3: 21:34:01 executing program 0: 21:34:01 executing program 2: 21:34:01 executing program 3: 21:34:01 executing program 0: 21:34:01 executing program 1: 21:34:01 executing program 0: 21:34:01 executing program 2: 21:34:01 executing program 3: 21:34:01 executing program 1: 21:34:01 executing program 0: 21:34:01 executing program 2: 21:34:01 executing program 3: 21:34:01 executing program 1: 21:34:01 executing program 0: 21:34:01 executing program 2: 21:34:01 executing program 3: 21:34:01 executing program 1: 21:34:01 executing program 3: 21:34:01 executing program 0: 21:34:01 executing program 1: 21:34:01 executing program 2: 21:34:01 executing program 0: 21:34:01 executing program 1: 21:34:01 executing program 3: 21:34:01 executing program 2: 21:34:01 executing program 0: 21:34:01 executing program 1: 21:34:01 executing program 3: 21:34:01 executing program 0: 21:34:01 executing program 2: 21:34:01 executing program 1: 21:34:01 executing program 0: 21:34:01 executing program 3: 21:34:01 executing program 2: 21:34:01 executing program 1: 21:34:01 executing program 0: 21:34:01 executing program 2: 21:34:01 executing program 2: 21:34:01 executing program 3: 21:34:01 executing program 1: 21:34:01 executing program 0: 21:34:01 executing program 2: 21:34:01 executing program 1: 21:34:01 executing program 3: 21:34:01 executing program 0: 21:34:01 executing program 2: 21:34:01 executing program 1: 21:34:01 executing program 2: 21:34:01 executing program 3: 21:34:01 executing program 0: 21:34:01 executing program 2: 21:34:01 executing program 1: 21:34:01 executing program 2: 21:34:01 executing program 0: 21:34:01 executing program 1: 21:34:01 executing program 3: 21:34:01 executing program 2: 21:34:01 executing program 3: 21:34:01 executing program 0: 21:34:01 executing program 1: 21:34:01 executing program 2: 21:34:01 executing program 0: 21:34:01 executing program 3: 21:34:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x2, 0x0, &(0x7f0000000380)) 21:34:02 executing program 3: 21:34:02 executing program 2: 21:34:02 executing program 0: 21:34:02 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, 0x0) 21:34:02 executing program 0: getrusage(0x6ee179e57dcd3df5, 0x0) 21:34:02 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1) 21:34:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x42, 0x0, &(0x7f00000003c0)) 21:34:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) socket(0x0, 0x4, 0x0) 21:34:02 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r0) 21:34:02 executing program 3: setrlimit(0x8, &(0x7f0000000180)) 21:34:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) add_key$user(0x0, 0x0, &(0x7f0000000140), 0x0, 0xfffffffffffffffd) 21:34:02 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREMOVE(r0, 0x0, 0x0) 21:34:02 executing program 0: ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) 21:34:02 executing program 2: r0 = epoll_create(0x100000001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) 21:34:02 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000009832, 0xffffffffffffffff, 0x0) 21:34:02 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x37, 0x0, &(0x7f0000000080)) 21:34:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000002e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20, &(0x7f0000002f40)={0x77359400}) 21:34:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) request_key(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) 21:34:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 21:34:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:34:02 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:34:02 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_netdev_private(r0, 0x0, 0x0) 21:34:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000740)=[{0x6, 0x0, 0x0, 0x50000}]}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 21:34:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) keyctl$dh_compute(0x17, 0x0, &(0x7f0000001540)=""/51, 0x33, 0x0) 21:34:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x44000800) 21:34:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) openat(r0, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) 21:34:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) request_key(0x0, &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='(ppp1#\x19\x00', 0xfffffffffffffff8) 21:34:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000080)) 21:34:02 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) execve(0x0, &(0x7f00000000c0), 0x0) 21:34:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x2, 0x0, 0x0, &(0x7f0000000380)) 21:34:03 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, 0x0) 21:34:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x37, &(0x7f0000000000)=""/71, &(0x7f0000000080)=0x47) 21:34:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000000140)="97", 0x1, 0x20000000, &(0x7f0000000040)=@ethernet={0x0, @random="2ca7c50193e6"}, 0x80) 21:34:03 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000200)=""/110) 21:34:03 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$inet(r0, 0x0, 0x0) 21:34:03 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendto(r0, &(0x7f0000000000)='x', 0x1, 0x20040000, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80) 21:34:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmmsg(r0, 0x0, 0x0, 0x8000) 21:34:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) ptrace$setregs(0xf, 0x0, 0x0, 0x0) 21:34:03 executing program 2: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x402812f6, 0x0) 21:34:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) mbind(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0x2, 0x0, 0x0, 0x0) 21:34:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000140)={0x0, 0x36f, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/206}, {&(0x7f00000004c0)=""/131}, {&(0x7f00000003c0)=""/200, 0x41}], 0x100000000000033a}, 0x0) 21:34:03 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) statx(r0, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0, &(0x7f0000000080)) 21:34:03 executing program 3: timerfd_settime(0xffffffffffffffff, 0x3e4a908b00f4e2cf, 0x0, 0x0) 21:34:03 executing program 1: prctl$PR_SET_FPEXC(0xc, 0x0) 21:34:03 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='f2fs\x00', 0x8, 0x0) 21:34:03 executing program 3: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000300)='.\x00', 0x20000401) 21:34:04 executing program 1: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) 21:34:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') preadv(r0, 0x0, 0x0, 0x0) [ 152.171704][ T39] audit: type=1400 audit(1578260044.007:48): avc: denied { watch watch_reads } for pid=9290 comm="syz-executor.3" path="/syzkaller-testdir890244065/syzkaller.B5rJin/53" dev="sda1" ino=16554 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=dir permissive=1 21:34:04 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, 0x0) 21:34:04 executing program 3: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000300)='.\x00', 0x20000401) 21:34:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendto(r0, &(0x7f0000000000), 0x0, 0x20040000, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80) 21:34:04 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x100) 21:34:04 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000003c0)=""/242, 0xf2) 21:34:04 executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x8a36a8ff7b77532c) 21:34:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x4) 21:34:05 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x0, 0x4000000000008d}, 0x0) 21:34:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, 0x0) 21:34:05 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) 21:34:05 executing program 3: io_submit(0x0, 0x0, &(0x7f0000000240)) 21:34:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) mount$9p_virtio(&(0x7f0000000040)='syz\x00', 0x0, &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000140)={'trans=virtio,'}) 21:34:05 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x24, 0x0, 0x0) 21:34:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000002e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20, 0x0) 21:34:05 executing program 2: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8000) 21:34:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) open$dir(0x0, 0x0, 0x0) 21:34:05 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 21:34:05 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) 21:34:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) add_key$user(0x0, 0x0, &(0x7f0000000140)="a0", 0x1, 0xfffffffffffffffd) 21:34:05 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 21:34:05 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) mbind(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0x2, &(0x7f0000000000), 0x0, 0x6) 21:34:05 executing program 0: mprotect(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x7) 21:34:06 executing program 0: write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x74) 21:34:06 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) 21:34:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) request_key(&(0x7f0000000240)='id_legacy\x00', 0x0, &(0x7f00000002c0)='(ppp1#\x19\x00', 0xfffffffffffffff8) 21:34:06 executing program 0: mknod(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 21:34:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) mbind(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0x2, &(0x7f0000000000), 0x0, 0x6) 21:34:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) 21:34:06 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 21:34:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$unix(r0, 0x0, 0x0) 21:34:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket(0x0, 0x0, 0x0) ioctl(r0, 0x0, 0x0) 21:34:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = eventfd(0x0) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x0) 21:34:06 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x10, &(0x7f0000000080), 0x4) 21:34:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket(0x0, 0x0, 0x0) ioctl(r0, 0x0, 0x0) 21:34:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 21:34:06 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) connect$unix(0xffffffffffffffff, 0x0, 0x0) 21:34:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, 0x0) 21:34:06 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x40081, 0x0) write$cgroup_int(r0, 0x0, 0x0) 21:34:06 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) connect(r0, 0x0, 0x0) 21:34:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)=""/71, 0x0) 21:34:06 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000001380)) 21:34:06 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 21:34:06 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt(r0, 0x0, 0x0, 0x0, 0x0) 21:34:06 executing program 1: select(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0xfc7}, 0x0) 21:34:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x0, 0x0) 21:34:06 executing program 3: r0 = socket(0x1, 0x1, 0x0) ioctl(r0, 0x0, 0x0) 21:34:07 executing program 3: shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) 21:34:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 21:34:07 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) 21:34:07 executing program 1: mprotect(&(0x7f00007e9000/0x1000)=nil, 0x1000, 0x4) 21:34:07 executing program 0: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3) 21:34:07 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) 21:34:07 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x101200, 0x0) 21:34:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) lgetxattr(0x0, &(0x7f0000000140)=@random={'trusted.', '\x00'}, &(0x7f0000000180)=""/117, 0x75) 21:34:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002dc0)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) 21:34:07 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) 21:34:07 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) 21:34:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) 21:34:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, 0x0, 0x0) 21:34:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:34:07 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) socket(0x8, 0x4, 0x0) 21:34:07 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff}) readv(r0, &(0x7f0000000040), 0x0) 21:34:07 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x0) 21:34:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) 21:34:07 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = getpgrp(0x0) ptrace$pokeuser(0x6, r0, 0x0, 0x0) 21:34:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4(0xffffffffffffffff, &(0x7f0000001580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000001600)=0x80, 0x1800) 21:34:08 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) 21:34:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) 21:34:08 executing program 1: signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) 21:34:08 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000880)='/dev/null\x00', 0x0, 0x0) connect$unix(r0, 0x0, 0x0) 21:34:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x33f1a738c1026aac) 21:34:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) fallocate(0xffffffffffffffff, 0x15, 0x0, 0x0) 21:34:08 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, 0x0) 21:34:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x33f1a738c1026aac) 21:34:08 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f0000000540)) 21:34:08 executing program 0: openat$cgroup(0xffffffffffffffff, &(0x7f0000000ec0)='syz1\x00', 0x200002, 0x0) 21:34:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, 0x0) 21:34:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 21:34:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) mbind(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0x2, 0x0, 0x0, 0x2) 21:34:08 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, 0x0) 21:34:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, &(0x7f00000000c0)) 21:34:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = getpgid(0x0) syz_open_procfs$namespace(r0, 0x0) 21:34:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, r1, 0x1) 21:34:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) prctl$PR_GET_THP_DISABLE(0x2a) 21:34:08 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) recvmsg(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x21) [ 156.884664][ T39] audit: type=1400 audit(1578260048.727:49): avc: denied { open } for pid=9540 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 21:34:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 21:34:08 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) lgetxattr(0x0, 0x0, &(0x7f0000000180)=""/117, 0x75) 21:34:08 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) bind$unix(r0, 0x0, 0x0) 21:34:08 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) 21:34:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x800) 21:34:08 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) read(r0, &(0x7f00000000c0)=""/238, 0x369) 21:34:08 executing program 3: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 21:34:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto(0xffffffffffffffff, &(0x7f0000000000)="0e", 0x1, 0x20004010, 0x0, 0x0) 21:34:09 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x4a00, 0x0, &(0x7f0000000540)) 21:34:09 executing program 1: open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 21:34:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) recvfrom(r0, 0x0, 0xfdb6, 0x0, 0x0, 0x186) 21:34:09 executing program 3: r0 = inotify_init() ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 21:34:09 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) flock(r0, 0x0) 21:34:09 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/urandom\x00', 0x100000, 0x0) 21:34:09 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 21:34:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) 21:34:09 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) execve(0x0, &(0x7f00000000c0), &(0x7f0000000300)) 21:34:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) 21:34:09 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = getpgrp(0x0) ptrace$setsig(0x4203, r0, 0x0, 0x0) 21:34:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) execve(0x0, 0x0, &(0x7f0000000300)) 21:34:09 executing program 3: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/90, 0x5a}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="002a2d4b3270a971ee529d9b1f811d27"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0xffffffffffffff86}, 0x0) [ 158.210170][ T9608] IPVS: ftp: loaded support on port[0] = 21 21:34:10 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) statx(r0, &(0x7f0000003a80)='./file0\x00', 0x0, 0x0, 0x0) 21:34:10 executing program 0: shmctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f0000000780)=""/4096) 21:34:10 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, 0x0) 21:34:10 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46340, 0x80) 21:34:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) [ 158.338487][ T39] audit: type=1800 audit(1578260050.177:50): pid=9624 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16577 res=0 21:34:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f00000003c0)) [ 158.359732][ T9622] IPVS: ftp: loaded support on port[0] = 21 [ 158.385081][ T39] audit: type=1800 audit(1578260050.177:51): pid=9624 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16577 res=0 21:34:10 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x800, 0x0, 0x0) 21:34:10 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) 21:34:10 executing program 1: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x0) 21:34:10 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x20000000, &(0x7f0000000040)=@ethernet={0x0, @random="2ca7c50193e6"}, 0x80) 21:34:10 executing program 3: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/90, 0x5a}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="0272aae16e010f05dfd5d71cc8bab91d6d936cf44cd317b97f2a55de2da11f6e18b9d00ffc2ffadbfb9717eba42e7fe4c05cb583ea3eda7784d6295485da75d990180231f59ebe181b0c1efb0834ccb53d1cec4a6f2a239e64b7933129033faecb9e1ba890153d6c7b44e714cda28b4f3fcba183aa4829e8639470759738801af931737681657f6decd5d726312531bc25ba09f691da2205000001ad6958f651438f5aec2b0a627181f982be1b312614ee1fb7ead43f88c89ac6fef1ea610820076a16019cc346d8884480141ebb4503000000c73822fd33b7f22ff104ad68db421422335d97ce336d513503de9d4a62d3d7b29b2f969add4af8c0b339ff750804c0a0f91011c34854d5e076ed7592bc914d44eee8e0080e510b224edcb1aacefd47a6eb51627a52fac53eed4cc9a20246a637eb5e95ce9028da700daf4089a89ca94c84c37738754288f1aa22eaa4ba6cdda04b3b1fb846c65802809bd2a65a6f7919847b65956fb34a9ee698c8057c7ee6f33c20e4b96ebdca22a4dc6d1a61df20edd8205cc448ed6b846ff0b6c35a4963e48427c098a542f36a05012161f74ad26a867740f64ed44aed19a4d5582b0a99f8c8a5781c91477302cf1e929bbec534eb4fc6b62b203bcc627913d817f57db502d57be3205727e2c6e47d2d201885eb6455273276e3a35a80d5aedbbac70a1b0a9173c797608479a7631eb8b63195efe23f354a7615900b191ed2e0053cebd06218df7fccf1717434a11c812057f083431a22cbacd089927d7c1509b0e94624b130b8aadd0af89eb4b6bfcc4cf67db95bd731892be3f1a2bf17917f4525f6e3463f331378f7ee7a872721adfea62c16bf0e4c4a25971c9e64ca3a55ef13eddc6d6557931f149a0929cb87b8371e354ef6f06b1abfb506d5b6c7d35b51dabd94a4d816fbd3491e17c0094a659053724b94da23e5d9b4d260ef723929d79f14361ddab19bde5a05677c161ce38324c9264288db8a67b79598ef0c00000000000000f21026f12c843afb510d2dff09f709aee946d38fe1f5304a11185bdf08e92ea42cfd576508359bd538195a0737c29445cda5504ddab67ebd1310dc8efc0380db010da701d2ffdc26575535f289535d625debc3492f7b3c20ff63c3b984813d7de5f0fd69580ec787de4a5c2ea293530a2f1fce30558b6dcb6776dcb256f817078849e597dd5651f65bcccccff1749cb46a79f37005a8ef555976a33eec417ce523ec5a94c8bfc8d2e61adad9f7759529bb7dc46d3954853aabe78f77e365075c04ee83091967504f7116d10fc2e3f3ef1ffc311397cffadb2ca0fcd4e18b44e08346192dba9840470b92a5a44d15df225f020abc62636c97509063f8d3633d8c0bc1fc783fd8f15d388dfa391c31b176ee3c730b765345d3a19300980567196ba63300"}) syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="002a2d4b3270a971ee529d9b1f811d27"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0xffffffffffffff86}, 0x0) 21:34:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) add_key$user(0x0, &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)="a0", 0x1, 0xfffffffffffffffd) 21:34:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) [ 158.715522][ T9645] IPVS: ftp: loaded support on port[0] = 21 21:34:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) [ 158.787241][ T2010] tipc: TX() has been purged, node left! 21:34:10 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) mbind(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0x1, 0x0, 0x0, 0x6) 21:34:10 executing program 1: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) 21:34:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8080) 21:34:10 executing program 0: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x180000) 21:34:10 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid\x00') ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) 21:34:10 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, 0x0) 21:34:10 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8910, 0x0) 21:34:10 executing program 2: pipe2$9p(&(0x7f0000000140), 0x800) 21:34:11 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 21:34:11 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) 21:34:11 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40, 0x0) 21:34:11 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x135) 21:34:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) add_key$user(0x0, &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 21:34:11 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 21:34:11 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$zero(0xffffffffffffff9c, 0x0, 0x302000, 0x0) 21:34:11 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) mount$9p_virtio(&(0x7f0000000040)='syz\x00', 0x0, 0x0, 0x0, &(0x7f0000000140)={'trans=virtio,'}) 21:34:11 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') 21:34:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001700), 0x0, 0x33f1a738c1026aac) 21:34:11 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) bind(0xffffffffffffffff, 0x0, 0x0) 21:34:11 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, 0x0) 21:34:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8983, 0x0) 21:34:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000400)) 21:34:11 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept(0xffffffffffffffff, 0x0, 0x0) accept(r0, 0x0, 0x0) 21:34:11 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001500)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 21:34:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x195) recvmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000580)=[{&(0x7f0000000480)=""/143, 0xfffffdde}], 0x8}, 0x0) 21:34:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x4c, 0x32, 0x0, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x10, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}]}]}, 0x4c}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:11 executing program 3: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:11 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r0, &(0x7f00000002c0)="90bfe7d3", 0x4, 0x0, &(0x7f0000000280)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x5, 0x4) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x40002102) [ 160.396881][ T9745] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:34:12 executing program 3: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000540)=0x10000, 0x4) 21:34:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0xe0}}, 0x0) 21:34:12 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x9, 0x4) sendto$inet(r0, &(0x7f00000002c0)="90bfe7d3", 0x4, 0x0, &(0x7f0000000280)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x5, 0x4) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x40002102) 21:34:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) [ 160.708529][ T39] audit: type=1400 audit(1578260052.547:52): avc: denied { create } for pid=9754 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 21:34:12 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f0000000a40), 0x28f, 0x111d9) 21:34:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0xe0}}, 0x0) 21:34:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) [ 160.935583][ T39] audit: type=1400 audit(1578260052.587:53): avc: denied { write } for pid=9754 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 21:34:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0xe0}}, 0x0) 21:34:12 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:12 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) socket$l2tp6(0xa, 0x2, 0x73) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f0000000a40), 0x28f, 0x111d9) 21:34:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0xe0}}, 0x0) 21:34:13 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:13 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) splice(r1, 0x0, r0, 0x0, 0x21f, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) 21:34:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:13 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:13 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0xe0}}, 0x0) 21:34:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:13 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:13 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0xe0}}, 0x0) 21:34:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@gettaction={0x20, 0x32, 0x0, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:13 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0xe0}}, 0x0) 21:34:13 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=@getsa={0x3c, 0x12, 0x1, 0x0, 0x0, {@in6=@mcast2}, [@srcaddr={0x14, 0xd, @in=@dev}]}, 0x3c}}, 0x0) 21:34:13 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:13 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:13 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=@getsa={0x3c, 0x12, 0x1, 0x0, 0x0, {@in6=@mcast2}, [@srcaddr={0x14, 0xd, @in=@dev}]}, 0x3c}}, 0x0) 21:34:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0xe0}}, 0x0) 21:34:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:13 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:13 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="cc000000240007051500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000090001006e6574656d0000004c0002000000000000000000000000000000e30000000000000000000c0002000000000000efffff230005001c0001000000000000000b0000000000000000000c0003000000000000644b0000000100000000000000000002000000050000f0573227851079e80000007eff06000300000000000000000000000002000000008d1300000500000000000000050000000000000002000300010000000000000000000000000005000000000000000200030000000000006b5b000000d679e5f30000b70f34bf6cc4b2ddd79290b16ec5c4f01be5"], 0xcc}}, 0x0) r0 = socket(0x10, 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 161.808064][ T9830] netlink: 192 bytes leftover after parsing attributes in process `syz-executor.0'. 21:34:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0xe0}}, 0x0) 21:34:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond0\x00'}) 21:34:13 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) [ 161.900281][ T9844] netlink: 192 bytes leftover after parsing attributes in process `syz-executor.0'. 21:34:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:13 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) [ 161.925782][ T9848] bond0: cannot enslave bond to itself. 21:34:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0xe0}}, 0x0) 21:34:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:13 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:13 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) [ 162.001897][ T9859] netlink: 192 bytes leftover after parsing attributes in process `syz-executor.0'. 21:34:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:13 executing program 2: setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:13 executing program 0: socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0xe0}}, 0x0) 21:34:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:13 executing program 0: socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0xe0}}, 0x0) 21:34:13 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:13 executing program 2: setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:14 executing program 0: socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0xe0}}, 0x0) 21:34:14 executing program 2: setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, 0x0, 0x0) 21:34:14 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:14 executing program 2: r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:14 executing program 2: r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, 0x0, 0x0) 21:34:14 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:14 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r0, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, 0x0, 0x0) 21:34:14 executing program 2: r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:14 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r0, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:14 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 21:34:14 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:14 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r0, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:14 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 21:34:14 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:14 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:14 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 21:34:14 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0}, 0x0) 21:34:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:14 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:14 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:14 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0}, 0x0) 21:34:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:14 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:14 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0}, 0x0) 21:34:14 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140), 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:14 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0], 0x4}}, 0x0) 21:34:14 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140), 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:14 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0], 0x4}}, 0x0) 21:34:14 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140), 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:14 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:14 executing program 1: socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x69) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0], 0x4}}, 0x0) 21:34:14 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) 21:34:14 executing program 1: socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x69) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:15 executing program 1: socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x69) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:15 executing program 1: r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) 21:34:15 executing program 1: r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 1: r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:15 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb432"], 0x5}}, 0x0) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 1: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb432"], 0x5}}, 0x0) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, 0x0, 0x0) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb432"], 0x5}}, 0x0) 21:34:15 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, 0x0, 0x0) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0"], 0x5}}, 0x0) 21:34:15 executing program 1: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:15 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, 0x0, 0x0) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0"], 0x5}}, 0x0) 21:34:15 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0"], 0x5}}, 0x0) 21:34:15 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 21:34:15 executing program 1: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb9", 0x8) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110"], 0x5}}, 0x0) 21:34:15 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110"], 0x5}}, 0x0) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb9", 0x8) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110"], 0x5}}, 0x0) 21:34:15 executing program 2: 21:34:15 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb9", 0x8) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df"], 0x5}}, 0x0) 21:34:15 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992", 0xc) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df"], 0x5}}, 0x0) 21:34:15 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992", 0xc) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df"], 0x5}}, 0x0) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992", 0xc) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:15 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c500"], 0x5}}, 0x0) 21:34:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea54", 0xe) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c500"], 0x5}}, 0x0) 21:34:15 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea54", 0xe) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) [ 164.157477][ T2010] tipc: TX() has been purged, node left! 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c500"], 0x5}}, 0x0) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea54", 0xe) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c500000000"], 0x5}}, 0x0) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c500000000"], 0x5}}, 0x0) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400", 0xf) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400", 0xf) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c500000000"], 0x5}}, 0x0) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400", 0xf) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c50000000000"], 0x5}}, 0x0) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) [ 164.421820][ T2010] tipc: TX() has been purged, node left! 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c50000000000"], 0x5}}, 0x0) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c50000000000"], 0x5}}, 0x0) 21:34:16 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x4}}, 0x0) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:16 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x4}}, 0x0) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x4}}, 0x0) 21:34:16 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x4}}, 0x0) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x4}}, 0x0) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x4}}, 0x0) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:16 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:16 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:16 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:16 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:17 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000003900)=""/70, 0x46}], 0x1}, 0x0) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:17 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, 0x0, 0x0) 21:34:17 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x4}}, 0x0) 21:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, 0x0, 0x0) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, 0x0, 0x0) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x4}}, 0x0) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000000104000000000000", @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x4}}, 0x0) 21:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, 0x0}, 0x0) 21:34:17 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x4}}, 0x0) 21:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, 0x0}, 0x0) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x4}}, 0x0) 21:34:17 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, 0x0}, 0x0) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x4}}, 0x0) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)}, 0x0) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:17 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, 0x0, 0x0) 21:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)}, 0x0) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)}, 0x0) 21:34:17 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, 0x0, 0x0) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{0x0}], 0x1}, 0x0) 21:34:17 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, 0x0, 0x0) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{0x0}], 0x1}, 0x0) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x20, 0x0, 0x7, {[@timestamp={0x44, 0x10, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x20, 0x5}, 0x0) 21:34:17 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000006dc0)={0x0, 0x0, &(0x7f0000006c40)=[{0x0}], 0x1}, 0x0) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e0000000120007000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x20, 0x0, 0x7, {[@timestamp={0x44, 0x10, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x20, 0x5}, 0x0) 21:34:17 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e00000001200070000000001040000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:17 executing program 2: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:17 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x20, 0x0, 0x7, {[@timestamp={0x44, 0x10, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x20, 0x5}, 0x0) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e00000001200070000000001040000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:17 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x0, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:17 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e00000001200070000000001040000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:18 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x0, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:18 executing program 2: r0 = socket(0x0, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:18 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x0, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e000000012000700000000010400000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:18 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:18 executing program 2: r0 = socket(0x0, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e000000012000700000000010400000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:18 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:18 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:18 executing program 2: r0 = socket(0x0, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:18 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e000000012000700000000010400000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:18 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:18 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:18 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e00000001200070000000001040000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:18 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0) 21:34:18 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:18 executing program 2: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e00000001200070000000001040000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:18 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0) 21:34:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="e00000001200070000000001040000000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="176112a2baaf11c946b290c58fd50d644e8f5c44d0f8b7fc61b7c3922a4c08675e38edbfa6751e14da5a47118d1e4eb4ee4270e95b2bed2ad132796a7a055617f3a408116e7a685fc86de9f177baf5f19c6ecfd106b9e3f4aa64ea3fb4320ec1c945246b1bfb636487be61ca796c3b6f9e264286eb44000000400000002add9e5c2a5578b766746345778f61c0260ec2b986f0f93ec504941f898acbc4c9a6edd29ea09110dda21f53e263d611068e65df5232d557c5000000000000"], 0x5}}, 0x0) 21:34:18 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:18 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0) 21:34:18 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:18 executing program 2: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:18 executing program 0: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) r1 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x53d, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x53d, 0x0) 21:34:18 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:18 executing program 2: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:18 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x5}, 0x0) 21:34:18 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:18 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:18 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x5}, 0x0) 21:34:18 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:18 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x5}, 0x0) 21:34:18 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:18 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:18 executing program 0: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) r1 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x53d, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x53d, 0x0) 21:34:18 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:18 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:18 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x10}}], 0x10, 0x5}, 0x0) 21:34:18 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x10}}], 0x10, 0x5}, 0x0) 21:34:18 executing program 3: socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:18 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:19 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x10}}], 0x10, 0x5}, 0x0) 21:34:19 executing program 3: socket(0x2000000000000021, 0x2, 0x10000000000002) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:19 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:19 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x0, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:19 executing program 0: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) r1 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x53d, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x53d, 0x0) 21:34:19 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:19 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:19 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x0, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:19 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x0, 0x3, 0x0, [0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 21:34:19 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, 0x0}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:19 executing program 3: r0 = socket(0x0, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:19 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x5, 0x3, 0x0, [0x0, 0x0]}]}}}], 0x20, 0x5}, 0x0) 21:34:19 executing program 0: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) r1 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x53d, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x53d, 0x0) 21:34:19 executing program 3: r0 = socket(0x0, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:19 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x5, 0x3, 0x0, [0x0, 0x0]}]}}}], 0x20, 0x5}, 0x0) 21:34:19 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, 0x0}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:19 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, 0x0}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:19 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x5, 0x3, 0x0, [0x0, 0x0]}]}}}], 0x20, 0x5}, 0x0) 21:34:19 executing program 3: r0 = socket(0x0, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:19 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x5, 0x3, 0x0, [0x0, 0x0]}]}}}], 0x20, 0x5}, 0x0) 21:34:19 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:19 executing program 3: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:19 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x5, 0x3, 0x0, [0x0, 0x0]}]}}}], 0x20, 0x5}, 0x0) 21:34:19 executing program 0: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) r1 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x53d, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000240), 0x53d, 0x0) 21:34:19 executing program 3: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:19 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x5, 0x3, 0x0, [0x0, 0x0]}]}}}], 0x20, 0x5}, 0x0) 21:34:19 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:19 executing program 3: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:19 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x5, 0x3, 0x0, [0x0, 0x0]}]}}}], 0x20, 0x5}, 0x0) 21:34:19 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:19 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x0) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:20 executing program 0: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) r1 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x53d, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000240), 0x53d, 0x0) 21:34:20 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x5, 0x3, 0x0, [0x0, 0x0]}]}}}], 0x20, 0x5}, 0x0) 21:34:20 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x0) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:20 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0], 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:20 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x0) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:20 executing program 1: socket$kcm(0x2, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {0x3}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x5, 0x3, 0x0, [0x0, 0x0]}]}}}], 0x20, 0x5}, 0x0) 21:34:20 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:20 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0], 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:20 executing program 0: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) r1 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x53d, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000240), 0x53d, 0x0) 21:34:20 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:20 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0], 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:20 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000002c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) recvmsg$can_raw(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000001700)=""/196, 0xc4}], 0x1}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) 21:34:20 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:20 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRESHEX], 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:20 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:20 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:20 executing program 0: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) r1 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x53d, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x53d, 0x0) 21:34:20 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRESHEX], 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:20 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:22 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc04", 0x5) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="80000000", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="080001000000000000000100030000000c00990000000000000000000c001a00aaaaaaaaaabb000008000300", @ANYRES32, @ANYBLOB="0c001a00ecea397324df00000c001a00aaaaaaaaaa040000"], 0x311}}, 0x0) recvmmsg(r1, &(0x7f0000003600)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 21:34:22 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT=0x0, @ANYRESHEX], 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:22 executing program 0: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) r1 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x53d, 0x0) 21:34:22 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES64=0x0, @ANYRESHEX], 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:22 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:22 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES64=0x0, @ANYRESHEX], 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:22 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:22 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES64=0x0, @ANYRESHEX], 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:22 executing program 1: r0 = socket$kcm(0x2, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8915, &(0x7f0000000000)) 21:34:22 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:22 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:22 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:22 executing program 0: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) r1 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x53d, 0x0) 21:34:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000500)='cpuset.effective_mems\x00', 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) 21:34:22 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) [ 170.796126][ T39] audit: type=1400 audit(1578260062.637:54): avc: denied { kernel } for pid=10857 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 21:34:22 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:22 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:22 executing program 0: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) r1 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x53d, 0x0) 21:34:23 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) 21:34:23 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x0, 0x439}, 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 21:34:23 executing program 0: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) r1 = socket$inet6(0xa, 0x4000000080002, 0x0) sendmmsg(r1, &(0x7f0000000240), 0x53d, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x53d, 0x0) [ 171.632438][ C1] hrtimer: interrupt took 24769 ns [ 190.642440][ T8841] kasan: CONFIG_KASAN_INLINE enabled [ 190.695678][ T8841] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 190.738396][ T8841] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 190.743316][ T8841] CPU: 0 PID: 8841 Comm: kworker/0:3 Not tainted 5.5.0-rc4-syzkaller #0 [ 190.743316][ T8841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 190.743316][ T8841] Workqueue: krxrpcd rxrpc_peer_keepalive_worker [ 190.743316][ T8841] RIP: 0010:selinux_socket_sendmsg+0x22/0x40 [ 190.743316][ T8841] Code: c3 e8 32 8d 5a fe eb e8 55 48 89 e5 53 48 89 fb e8 f3 d3 1c fe 48 8d 7b 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 11 48 8b 7b 18 be 04 00 00 00 e8 fa fb ff ff 5b 5d [ 190.743316][ T8841] RSP: 0018:ffffc90000fef9f0 EFLAGS: 00010206 [ 190.743316][ T8841] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff8399da35 [ 190.743316][ T8841] RDX: 0000000000000003 RSI: ffffffff8358593d RDI: 0000000000000018 [ 190.743316][ T8841] RBP: ffffc90000fef9f8 R08: ffff8880601cc440 R09: fffffbfff165f1be [ 190.743316][ T8841] R10: fffffbfff165f1bd R11: ffffffff8b2f8def R12: dffffc0000000000 [ 190.743316][ T8841] R13: ffffc90000fefb20 R14: ffffc90000fefb20 R15: 000000000000001d [ 191.030405][ T8841] FS: 0000000000000000(0000) GS:ffff88802d000000(0000) knlGS:0000000000000000 [ 191.030405][ T8841] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 191.030405][ T8841] CR2: ffffffffff600400 CR3: 000000001e88a000 CR4: 0000000000340ef0 [ 191.030405][ T8841] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 191.030405][ T8841] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 191.186296][ T8841] Call Trace: [ 191.186296][ T8841] security_socket_sendmsg+0x77/0xc0 [ 191.186296][ T8841] sock_sendmsg+0x45/0x130 [ 191.186296][ T8841] kernel_sendmsg+0x44/0x50 [ 191.186296][ T8841] rxrpc_send_keepalive+0x1ff/0x940 [ 191.186296][ T8841] ? rxrpc_reject_packets+0xab0/0xab0 [ 191.186296][ T8841] ? _raw_spin_unlock_bh+0x2c/0x30 [ 191.186296][ T8841] ? __local_bh_enable_ip+0x15a/0x270 [ 191.186296][ T8841] ? lockdep_hardirqs_on+0x421/0x5e0 [ 191.186296][ T8841] ? rxrpc_peer_keepalive_worker+0x62e/0xd02 [ 191.186296][ T8841] ? __local_bh_enable_ip+0x15a/0x270 [ 191.186296][ T8841] rxrpc_peer_keepalive_worker+0x7be/0xd02 [ 191.186296][ T8841] ? rxrpc_peer_add_rtt+0x650/0x650 [ 191.186296][ T8841] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 191.186296][ T8841] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 191.186296][ T8841] ? trace_hardirqs_on+0x67/0x240 [ 191.186296][ T8841] process_one_work+0x9af/0x1740 [ 191.186296][ T8841] ? pwq_dec_nr_in_flight+0x320/0x320 [ 191.186296][ T8841] ? lock_acquire+0x190/0x410 [ 191.186296][ T8841] worker_thread+0x98/0xe40 [ 191.186296][ T8841] ? trace_hardirqs_on+0x67/0x240 [ 191.186296][ T8841] kthread+0x361/0x430 [ 191.186296][ T8841] ? process_one_work+0x1740/0x1740 [ 191.186296][ T8841] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 191.186296][ T8841] ret_from_fork+0x24/0x30 [ 191.186296][ T8841] Modules linked in: [ 191.651680][ T8838] kasan: CONFIG_KASAN_INLINE enabled [ 191.699425][ T8838] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 191.719715][ T8841] ---[ end trace 4efaa1cbb53facf4 ]--- [ 191.746037][ T8838] general protection fault: 0000 [#2] PREEMPT SMP KASAN [ 191.771167][ T8841] RIP: 0010:selinux_socket_sendmsg+0x22/0x40 [ 191.752807][ T8838] CPU: 2 PID: 8838 Comm: kworker/2:2 Tainted: G D 5.5.0-rc4-syzkaller #0 [ 191.752807][ T8838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 191.752807][ T8838] Workqueue: krxrpcd rxrpc_peer_keepalive_worker [ 191.752807][ T8838] RIP: 0010:selinux_socket_sendmsg+0x22/0x40 [ 191.752807][ T8838] Code: c3 e8 32 8d 5a fe eb e8 55 48 89 e5 53 48 89 fb e8 f3 d3 1c fe 48 8d 7b 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 11 48 8b 7b 18 be 04 00 00 00 e8 fa fb ff ff 5b 5d [ 191.752807][ T8838] RSP: 0018:ffffc90000faf9f0 EFLAGS: 00010206 [ 191.752807][ T8838] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff8399da35 [ 191.752807][ T8838] RDX: 0000000000000003 RSI: ffffffff8358593d RDI: 0000000000000018 [ 191.752807][ T8838] RBP: ffffc90000faf9f8 R08: ffff888060a2c380 R09: ffffed10058da221 [ 191.752807][ T8838] R10: ffffed10058da220 R11: ffff88802c6d1107 R12: dffffc0000000000 [ 191.752807][ T8838] R13: ffffc90000fafb20 R14: ffffc90000fafb20 R15: 000000000000001d [ 191.752807][ T8838] FS: 0000000000000000(0000) GS:ffff88802d200000(0000) knlGS:0000000000000000 [ 191.752807][ T8838] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 191.752807][ T8838] CR2: 0000000001e3d914 CR3: 000000002a07b000 CR4: 0000000000340ee0 [ 191.780716][ T8838] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 191.780716][ T8838] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 191.780716][ T8838] Call Trace: [ 191.780716][ T8838] security_socket_sendmsg+0x77/0xc0 [ 191.780716][ T8838] sock_sendmsg+0x45/0x130 [ 191.780716][ T8838] kernel_sendmsg+0x44/0x50 [ 191.780716][ T8838] rxrpc_send_keepalive+0x1ff/0x940 [ 191.780716][ T8838] ? __kasan_check_read+0x11/0x20 [ 191.780716][ T8838] ? rxrpc_reject_packets+0xab0/0xab0 [ 191.780716][ T8838] ? lock_timer_base+0x56/0x1b0 [ 191.780716][ T8838] ? lock_downgrade+0x920/0x920 [ 191.780716][ T8838] ? rxrpc_peer_keepalive_worker+0x62e/0xd02 [ 191.780716][ T8838] ? rxrpc_peer_keepalive_worker+0x62e/0xd02 [ 191.780716][ T8838] ? rxrpc_peer_keepalive_worker+0x62e/0xd02 [ 191.780716][ T8838] ? __local_bh_enable_ip+0x15a/0x270 [ 191.780716][ T8838] rxrpc_peer_keepalive_worker+0x7be/0xd02 [ 191.780716][ T8838] ? mark_held_locks+0xf0/0xf0 [ 191.780716][ T8838] ? rxrpc_peer_add_rtt+0x650/0x650 [ 191.780716][ T8838] ? trace_hardirqs_on+0x67/0x240 [ 191.780716][ T8838] process_one_work+0x9af/0x1740 [ 191.780716][ T8838] ? pwq_dec_nr_in_flight+0x320/0x320 [ 191.780716][ T8838] ? lock_acquire+0x190/0x410 [ 191.780716][ T8838] worker_thread+0x98/0xe40 [ 191.780716][ T8838] ? trace_hardirqs_on+0x67/0x240 [ 191.780716][ T8838] kthread+0x361/0x430 [ 191.780716][ T8838] ? process_one_work+0x1740/0x1740 [ 191.780716][ T8838] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 191.780716][ T8838] ret_from_fork+0x24/0x30 [ 191.780716][ T8838] Modules linked in: [ 191.810171][ T8838] ---[ end trace 4efaa1cbb53facf5 ]--- [ 191.834439][ T8841] Code: c3 e8 32 8d 5a fe eb e8 55 48 89 e5 53 48 89 fb e8 f3 d3 1c fe 48 8d 7b 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 11 48 8b 7b 18 be 04 00 00 00 e8 fa fb ff ff 5b 5d [ 191.834446][ T8841] RSP: 0018:ffffc90000fef9f0 EFLAGS: 00010206 [ 191.834453][ T8841] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff8399da35 [ 191.834458][ T8841] RDX: 0000000000000003 RSI: ffffffff8358593d RDI: 0000000000000018 [ 191.834464][ T8841] RBP: ffffc90000fef9f8 R08: ffff8880601cc440 R09: fffffbfff165f1be [ 191.834469][ T8841] R10: fffffbfff165f1bd R11: ffffffff8b2f8def R12: dffffc0000000000 [ 191.834473][ T8841] R13: ffffc90000fefb20 R14: ffffc90000fefb20 R15: 000000000000001d [ 191.834485][ T8841] FS: 0000000000000000(0000) GS:ffff88802d000000(0000) knlGS:0000000000000000 [ 191.834490][ T8841] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 191.834494][ T8841] CR2: ffffffffff600400 CR3: 000000002a07b000 CR4: 0000000000340ef0 [ 191.834731][ T8841] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 191.834736][ T8841] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 191.834779][ T8841] Kernel panic - not syncing: Fatal exception [ 191.843714][ T8841] Kernel Offset: disabled [ 191.843714][ T8841] Rebooting in 86400 seconds..