\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') r3 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r3) splice(r2, 0x0, r3, 0x0, 0x8, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380), 0x82, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x20, 0x8, 0xff, 0x0, 0x9, 0x200, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x4, 0x7}, 0xc204, 0x62d, 0x101, 0x3, 0x7, 0x2, 0xfffa, 0x0, 0x6, 0x0, 0x7}, 0x0, 0x9, r4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:19 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0xc00, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:20 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x3f4]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:20 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x4800000, &(0x7f0000000300)="515f3a949fc17d0087b44ec80b78e9803bfcef99655c736c9ef74f6d69f5e29274c0766ad59bb04c2ad425f9189f484f0936b01a055f90205a49166feaba734596922b5891b456865e555def252f36d1420787d13501a5f8c4b91b85259168a721cfc0d1736840122e00ed2b8385efd69a15fd1ff871a91bafd2956619b70c000dde81670a861088bfe1dbe3218fd7bc42e16d772453839c6580ea30660a84d4fb85108e084e197430237f5fa9fb9add764d4347f4cfacd0", &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000680)="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") r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r2, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:20 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x8800}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:20 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0xc, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:20 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x500]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:20 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x1002, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:20 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:20 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x8802}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:20 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0xd, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:20 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x1100, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:20 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x600]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:21 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) r2 = syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) r4 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0xfe03, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3001000010000104000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="e68d9009d26089ec16e88cb2fa6a39e3b5c04defd2df4b1399f1b2836a58510a8a4662ea56b2dcb231eb791ba176a168dfbed9edbcdc8fe7892dda1c788b564c0a5424a6f5db3a16eca84ad746f7e17600e83090c771b0240e02a85b43098031d8745b72f83bbd8f6b30558ef1dca059dfd3bd3a992bb22566afb0d3b3effc5306df8b46b4d70d2d9f9d497624b99ac65e677eb4150e0a75b017b4a3b83c566f886975ff1387334f436b37a31a521bf1d731d37e23d1ac4e61d2c402086d7b02e197e19c7eed93739ab1"], 0x130}}, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000f40)=""/4096, 0x1000, 0x12002, &(0x7f00000001c0)=@xdp={0x2c, 0xf, 0x0, 0x16}, 0x80) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)=@bridge_delvlan={0x3c, 0x71, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xc}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xb}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x1}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4c0a4) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340), 0x121000, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r5, &(0x7f0000000740)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000880)=ANY=[@ANYBLOB="0c010000", @ANYRES16=r2, @ANYBLOB="020029bd7000fbdbdf250100000090000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="1400020074756c3000000000000000000000001400020073797a5f74756e0000000000000000000800010012f4400136febd3e78e11f2c449f0eea0432f52314e41794882a7c1ce2b206269e5b46f79c54bf813cabc9d183b805e92d29f0b558492e1a016d0a36966c6ee05b6de528a9b7739ff9b2339fc32717a8b5f6cb014b5b5094751948b1926d8614a1288c55cb96a92e008a99c5cfe155671bdf6d3975db2464abfb6871c03ba5236d53632cd7ed6ee76f0fc2a1a3c49027c8fce0b0593b63b4dceb8b844c653e5b12f53eccc4b26b4a46a71faf81d103e1b94c68fa46be8cc132a113ee9e0e8f89", @ANYRES32=0x0, @ANYBLOB="08000300000000001400020067656e65766531000000000000000000080003000200000014000200626f6e645f736c6176655f300000000014000200766c616e3000000000000000000000006800028014000180080001000000000008000100040000001c00018008000100080000000800010002000000080001000200000034000180080001000200000008000100000000000800010001000000080001000700000008000100040000000800010000000000"], 0x10c}}, 0x40080) 04:05:21 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x9003}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:21 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x25}, 0x8118, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) r2 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000300)) ioctl$BTRFS_IOC_BALANCE_CTL(r2, 0x40049421, 0x3) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r3, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:21 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x1101, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:21 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0xf, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:21 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x700]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:21 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x1803, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:21 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x10, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:21 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0xc00]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:21 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0xa102}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:21 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000003c0), 0x0, 0x5, 0x2) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0x91e, 0x11, 0x400], 0x3, 0x0, 0x0, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000380)=0x3, 0x4) r3 = fcntl$dupfd(r1, 0x0, r1) r4 = gettid() syz_open_procfs(r4, &(0x7f0000000040)='net/ipv6_route\x00') perf_event_open(0x0, r4, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x7f, 0x1, 0x31, 0x8, 0x0, 0x7, 0x82080, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7ff, 0x4, @perf_bp={&(0x7f00000003c0), 0x3}, 0x0, 0xfffffffffffffff8, 0x58, 0x4, 0x4, 0x1af59aee, 0xfffb, 0x0, 0x2, 0x0, 0x2}, r4, 0xb, r0, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r5, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:22 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0xa803}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:22 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x1002]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:22 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x11, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:22 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) syz_open_procfs(0x0, &(0x7f0000000680)='net/dev\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x353, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="340000fbffe6ef00cbc7951e6064079630fb288709ab9bc3b97a54e0eca5ea850679c1a2cf986bed279b8bda0830baecb826f71fb0381c560d56c8615f9c1b17d8284605ba27457fc7aecb49c2acd62b087319fb13e8de5d3a", @ANYRES16=r3, @ANYBLOB="010000000000000000001400006018000180140002006e657464657673696d300000000000000800130000000000"], 0x34}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000600)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x24, r3, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000006, 0x8010, r0, 0x4a988000) 04:05:22 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0xd403}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:22 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x1d00, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:22 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x1100]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:22 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000500)={0x80, 0x0, &(0x7f00000003c0)=[@register_looper, @clear_death={0x400c630f, 0x2}, @clear_death={0x400c630f, 0x2}, @decrefs={0x40046307, 0x3}, @request_death={0x400c630e, 0x3}, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000300)={@flat=@weak_binder={0x77622a85, 0x301e, 0x1}, @fda={0x66646185, 0x6, 0x0, 0x30}, @fda={0x66646185, 0x4, 0x0, 0x10}}, &(0x7f0000000380)={0x0, 0x18, 0x38}}}], 0xb5, 0x0, &(0x7f0000000440)="5d8da57b1024ded9e9a44973d555a160db6c9a8d35195b2029009c939e971259f7fcb1dd2d5b5b6f14fdbc2e64d7acf90679f85f7e8fb8a3553109f8c5022fdc90c67c10dc0bad03ca290ac4c0c7f5f9267b256187594a8603b4db0ac1638ef6577872b477f7050a23135d1527dad8e94740a6385a9aab3fc821dee317b3ca69d757280842259f970f67f5efebc263a96e19e8b8f381c4953bdcf0b458c1893c11ee4de66fc4628c20c731ad3dbf0d693c55275531"}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r2, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:22 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380), &(0x7f0000000540)={'L+', 0x81}, 0x16, 0x2) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10, 0xffffffffffffffff, 0x91662000) 04:05:22 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x2402, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:22 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x12, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) [ 2410.702757][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 2410.709375][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 04:05:22 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0xda01}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:22 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x1101]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:22 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x3, 0x3, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x8, 0x6, 0x1f, 0xa7, 0x0, 0x1000, 0x40000, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x8001, 0x1}, 0xc02, 0x3, 0x800003f, 0x3, 0x936b, 0x100, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, r1, 0x1) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendto$inet(r3, &(0x7f0000000300)="741ac78b3848b77b9e42baa609264c9751900d8f00676e4631cee7f376499fb643700e32b80378a76634291fb219673a3c71527efff61ebd43e0539503", 0x3d, 0x24000001, &(0x7f0000000340)={0x2, 0x4e22, @private=0xa010100}, 0x10) openat$cgroup_type(r0, &(0x7f0000000400), 0x2, 0x0) splice(r4, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x100) 04:05:23 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x13, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:23 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0xe200}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:23 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) read$FUSE(r1, &(0x7f0000001840)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) fstat(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r1, &(0x7f0000003880)="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", 0x2000, &(0x7f0000000d80)={&(0x7f0000000340)={0x50, 0xb, 0x7ff, {0x7, 0x22, 0x6, 0x200000, 0x4, 0x6, 0x9, 0x2}}, &(0x7f0000000540)={0x18, 0xfffffffffffffff5, 0xffffffff, {0xd53}}, &(0x7f0000000600)={0x18, 0x0, 0x4ff517b3, {0x200}}, &(0x7f0000000640)={0x18, 0x0, 0x9, {0xfffff801}}, &(0x7f0000000680)={0x18, 0x0, 0x3, {0x4}}, &(0x7f00000006c0)={0x28, 0x0, 0xd72, {{0x0, 0x7, 0x1, 0xffffffffffffffff}}}, &(0x7f0000000700)={0x60, 0x0, 0x2, {{0xbaf, 0x4, 0x80, 0x77a, 0x1, 0xfffff000, 0xfff, 0x10001}}}, &(0x7f0000000780)={0x18, 0xfffffffffffffff5, 0x3, {0x3}}, &(0x7f00000007c0)={0x13, 0x0, 0x80000000, {':.\x00'}}, &(0x7f0000000800)={0x20, 0xffffffffffffffda, 0x6, {0x0, 0x16}}, &(0x7f0000000840)={0x78, 0x0, 0x5f52, {0x8, 0x20, 0x0, {0x5, 0x1deb, 0x3, 0x4, 0x399, 0x200, 0x6, 0x5, 0x4c, 0x8000, 0x9, r2, 0xee00, 0xffffff7f, 0x10000}}}, &(0x7f00000008c0)={0x90, 0xb34c760b7c9c45e0, 0xff, {0x5, 0x3, 0x0, 0x80000001, 0x80000000, 0x3, {0x3, 0x101, 0x8000, 0x2, 0x100000000, 0x3, 0x57, 0x3, 0x1, 0x1000, 0xffff, r2, 0xee00, 0x3c, 0x101}}}, &(0x7f0000000980)={0xe0, 0x0, 0x1, [{0x4, 0x7f, 0x5, 0xfd, '\'*W.}'}, {0x2, 0x5, 0xa, 0x8, 'connlimit\x00'}, {0x2, 0x8, 0xa, 0x3, 'connlimit\x00'}, {0x4, 0x80000001, 0x8, 0x7, '@+!{#^!:'}, {0x6, 0x4cca, 0xa, 0xebe6, 'connlimit\x00'}, {0x0, 0x0, 0x0, 0x3f}]}, &(0x7f0000000b00)={0x150, 0x6f8450c25a03c118, 0x2, [{{0x6, 0x2, 0x4, 0xffffffff, 0xffffffff, 0x0, {0x1, 0x1, 0x2, 0x9, 0xffff, 0xffffffffffffff81, 0x6, 0xfffff6ce, 0x3, 0xc000, 0x5, r2, 0xee01, 0xa145, 0x8ba8}}, {0x0, 0x400, 0x3, 0x1, ']-['}}, {{0x2, 0x3, 0x3, 0x5, 0xa9e9, 0x2, {0x1, 0xfffffffffffffffd, 0xcaf4, 0x0, 0x7ff, 0x7, 0x5, 0x1, 0x8001, 0x2000, 0x0, r2, r4, 0x6, 0x20}}, {0x2, 0x0, 0x3, 0x6, '---'}}]}, &(0x7f0000000c80)={0xa0, 0xffffffffffffffda, 0xe6ee, {{0x3, 0x3, 0x5, 0x1000, 0x1, 0x5, {0x6, 0xd8, 0x1, 0x9, 0x1, 0x22f, 0x3, 0x3b1, 0xac25, 0x4000, 0x3, r2, 0xee01, 0x965, 0x17400000}}, {0x0, 0xf}}}, &(0x7f0000000d40)={0x20, 0x0, 0x9, {0xfff, 0x4, 0x7ff, 0x4}}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:23 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x3001, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:23 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) r3 = syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="3a0000020000000018000e00", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00 \x00\x00\x00./file0\x00']) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r5 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r5) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x8c, 0x6, 0x5, 0x0, 0x0, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x622e, 0x2, @perf_bp={&(0x7f0000000940), 0x4}, 0x20, 0x0, 0x7, 0x4, 0x0, 0x100, 0x7, 0x0, 0x800}, r6, 0xe, r5, 0x3) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000005c0)={'vcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f0000000ac0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000a80)={&(0x7f0000001840)={0x1478, r3, 0x200, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x108, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}]}, @ETHTOOL_A_FEATURES_WANTED={0x12f8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x30be}, @ETHTOOL_A_BITSET_BITS={0x178, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, './cgroup.cpu/syz0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd38}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '*\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, ':\xfa&.+L\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'TEE\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x35}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'raw\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'pptp\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'CT\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devgroup\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xfd\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '+-{\'!\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '${*$]&$\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\xe3!#]%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'raw\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']$&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '\xf7[}!{\x11!@*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'GPL\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '[)\x0f/\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}]}]}, @ETHTOOL_A_BITSET_VALUE={0x7f, 0x4, "7bb7edbbac11415138a6c4ff41e39a462ffcf6feb4424c8bc14836ab6a92a8b03a825d93dd0fd831d38e05bc90f19702efcd7c2ddab02df5cb9b593064c74e3fa63118939ff42d03d3b12fa55a1f365eb178d52df2fab046ef4cf5bd45b91211e6fa3f40247f4e8763b5993942cc3f779c76cb415e81b10a232b92"}]}]}, 0x1478}, 0x1, 0x0, 0x0, 0x20024800}, 0x8810) splice(r4, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:23 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x1803]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:23 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x14, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:23 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0xf403}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:23 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x3002, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:23 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x1d00]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:23 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) r0 = perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xce032, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bind$inet6(r1, &(0x7f0000000380)={0xa, 0x4e21, 0x388, @local, 0xa0}, 0x1c) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000700)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000000740), &(0x7f0000000780)={'U+', 0x3}, 0x16, 0x1) 04:05:23 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x15, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:23 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x3403, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:23 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x20000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:24 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x16, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:24 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x2402]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:24 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) statx(r1, &(0x7f0000000380)='./file0\x00', 0x400, 0x8, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x400a0, &(0x7f00000004c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0xff}}, {@allow_other}], [{@fowner_lt={'fowner<', r2}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '.'}}]}}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r3, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:24 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x17, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:24 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x40000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:24 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000340)='raw\x00') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000540)={0x1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:24 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x3001]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:24 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x4a00, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:24 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x5c03, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:24 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x1000000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:24 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) r2 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r2) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x8c, 0x6, 0x5, 0x0, 0x0, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x622e, 0x2, @perf_bp={&(0x7f0000000940), 0x4}, 0x20, 0x0, 0x7, 0x4, 0x0, 0x100, 0x7, 0x0, 0x800}, r3, 0xe, r2, 0x3) setsockopt$inet6_tcp_int(r2, 0x6, 0x1b, &(0x7f0000000340)=0x3, 0x4) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:24 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x18, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:25 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x3002]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:25 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x6203, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:25 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r2, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:25 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x2000000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:25 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x19, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:25 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x3403]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:25 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x6403, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:25 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0xff07, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffb, 0x3}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80b6, 0xfffe, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x8, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) clone(0x80903000, &(0x7f0000000840)="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"/434, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000300)="f6b1574cf87430e3") sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0x0, 0x0, &(0x7f00000004c0)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r2, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) fallocate(r2, 0x549d9912f93c6370, 0xff, 0x5) 04:05:25 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x4a00]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:25 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x8800, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:25 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x2030000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:25 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x1a, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:25 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x8802, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:25 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x5c03]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:25 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0x19}}, './file0\x00'}) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0xff, 0x20, 0x40, 0x3, 0x0, 0x0, 0x21000, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x25c, 0x2, @perf_config_ext={0x8, 0x20}, 0x2080, 0x9, 0x8000, 0x9, 0x4, 0xba59, 0x8, 0x0, 0x57, 0x0, 0xc91d}, 0x0, 0x7, r3, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0xfe03, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3001000010000104000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB="e68d9009d26089ec16e88cb2fa6a39e3b5c04defd2df4b1399f1b2836a58510a8a4662ea56b2dcb231eb791ba176a168dfbed9edbcdc8fe7892dda1c788b564c0a5424a6f5db3a16eca84ad746f7e17600e83090c771b0240e02a85b43098031d8745b72f83bbd8f6b30558ef1dca059dfd3bd3a992bb22566afb0d3b3effc5306df8b46b4d70d2d9f9d497624b99ac65e677eb4150e0a75b017b4a3b83c566f886975ff1387334f436b37a31a521bf1d731d37e23d1ac4e61d2c402086d7b02e197e19c7eed93739ab1"], 0x130}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'batadv0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000b80)={'wlan1\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000c00)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000bc0)={&(0x7f0000001840)=@newtaction={0xca84, 0x30, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [{0x1a4, 0x1, [@m_ife={0x10c, 0x10, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_SMAC={0xa, 0x4, @multicast}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x5, 0x10001, 0x4, 0x100, 0xf5}, 0x1}}]}, {0xb9, 0x6, "d6d9fa1b7342ba07d1d4bc64b2aa79792270fd62ec4abc8798da6e9895cb66c7f0d580cee1b6eabdf4131749538411e0c00a4d7013931f63c1128fe99c6ce4b298626d881750736d9cf7c680b0c643c48579ef39b477c4b5103c0ad88feecb35e5068b634e70b4ddabbb3a2012b7441f5fe698faa45dbf5c88dd95a0633c0b0991da501755e4c896663648fefe0cc5733d18ac20c6a3525d056d0bd5287bd9aa65a0f8f494903558107283785ce409a8149af9f5d0"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_ct={0x94, 0x16, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_ACTION={0x6, 0x3, 0x12}, @TCA_CT_MARK_MASK={0x8, 0x6, 0x5}, @TCA_CT_ACTION={0x6}, @TCA_CT_ZONE={0x6, 0x4, 0x1}]}, {0x49, 0x6, "537cf74d2b6969b36b16b33b101c4e0a7aa1688f0577f9b4c54319ed08caba9aa1d2f7535cc43db373e4ffb7b5b5c51be5ff2c84b54f6b1a29d42c7e6b241a02a3ad89b77f"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}, {0x170, 0x1, [@m_ipt={0x16c, 0x1e, 0x0, 0x0, {{0x8}, {0x90, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_INDEX={0x8, 0x3, 0xe0ac}, @TCA_IPT_INDEX={0x8, 0x3, 0x8}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}]}, {0xb6, 0x6, "4f9e8ee979d791ff080e49c4c846c0698facc663c11fe7902aaeb5a67d9bfce07223565224fe51ead344d47d93003ffedbd2a7af5d240cb6026a8ec268d828c3c969467452d3293d75585b1903b8ccced26ec5081c2f19b61c2a0a3cf24c54dadd6a8eab031c235bf3514de2fea9f8344afcccc60f96d845fcf6464703837e9cfe64388ab555887af2bffa47f7f80a72ecfd909031169d932513aaeca4c9d6ae1a7c280a7ee25cdf8a08b2fd84379759a338"}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}]}, {0x758, 0x1, [@m_gact={0xe0, 0x18, 0x0, 0x0, {{0x9}, {0x28, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x2, 0x519, 0x2e10c0b7aeefc308}}, @TCA_GACT_PARMS={0x18, 0x2, {0x4, 0x5, 0x1, 0x0, 0x4}}]}, {0x90, 0x6, "e8869c043c21ba698a6b981e6efcb89b8b3cf891f5caa6aa3b0dd154f0e5a6ceae0908f9fe6e3dca4e7aa38c6dc85979f8864c9d5129b26c84f965ea82a4cb313f0bc6df6067b7f3bba1cd00f363d4d65eebf8018a8f8ef1b62577d5054f00a12bb772ee64db770de887798820404d4f4c113afd230a0d1f75cb6f09026bab0fde03ad63a18cac9bf7f0926b"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_police={0x80, 0x6, 0x0, 0x0, {{0xb}, {0x38, 0x2, 0x0, 0x1, [[@TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x28d0}, @TCA_POLICE_RESULT={0x8, 0x5, 0x6}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x81}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x1000}]]}, {0x1e, 0x6, "a18b1682ad8191e54d49c17e74b60379552c55f5a312b7e20f53"}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}, @m_ife={0xa8, 0x19, 0x0, 0x0, {{0x8}, {0x24, 0x2, 0x0, 0x1, [@TCA_IFE_METALST={0x14, 0x6, [@IFE_META_PRIO={0x8, 0x3, @val=0x4}, @IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_TCINDEX={0x4, 0x5, @void}]}, @TCA_IFE_SMAC={0xa, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}]}, {0x5d, 0x6, "0b0d2785555bc8efab7358c73d68b2cd75f89e8e387349dffde3074023bbfca5af54c3bf65d96e2f352f2665781b1b595321a9e85aac5379ba554928e027ced595616db237596983369c216f3e20d9ab5f4e7f3b368898fadb"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_simple={0xf0, 0x8, 0x0, 0x0, {{0xb}, {0x80, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x5, 0x3, '\x00'}, @TCA_DEF_DATA={0x7, 0x3, '}*\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x5, 0x7, 0xffffffffffffffff, 0xe51, 0x9}}, @TCA_DEF_PARMS={0x18, 0x2, {0xb3c, 0x20000000, 0x4, 0x2, 0x40}}, @TCA_DEF_PARMS={0x18, 0x2, {0x40000000, 0xd1, 0x4, 0xfffffeff}}, @TCA_DEF_DATA={0x9, 0x3, 'pptp\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0xfffffffa, 0x4, 0x10000000, 0x6, 0x8}}]}, {0x45, 0x6, "e831c0f619671a1f516e5d8811dd3f7a1f09a9e6a08b73ef615121c3b2c8ad448e202827f007aa0d0f79997fedaaacf4a571c7388cbc9fdcbe1ddbf6d377a7b8cf"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_sample={0x114, 0x1b, 0x0, 0x0, {{0xb}, {0x44, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x8}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0xfffffff9}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x1000, 0x4, 0x5, 0xd2, 0x2}}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x1}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0xffffff04}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x7}]}, {0xa5, 0x6, "0503d75b2aa0637bde81138eb9be8e877139c7d58f0bbd33d23eb70b54c7e8a23566f7f0897091ad436dc6e5c8e747da3378d6d28da80fdaad09ff961321401905049e4b53d7372cc840d102c3b032bb1a1310226b8483f11478d449b7f228de5b7d706c8e423ad49c4ad7303db69ac27f8378494cd19522130e6ac515abeae5a330529b67522c280f15864415a3f1bfb9f5fc8781318be01fd0063679d83f7709"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}, @m_skbmod={0x94, 0x9, 0x0, 0x0, {{0xb}, {0x60, 0x2, 0x0, 0x1, [@TCA_SKBMOD_PARMS={0x24, 0x2, {{0x8000, 0x7, 0xf, 0x7d, 0x4}, 0x7}}, @TCA_SKBMOD_SMAC={0xa, 0x4, @broadcast}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x4}, @TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}, @TCA_SKBMOD_SMAC={0xa, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @TCA_SKBMOD_SMAC={0xa}]}, {0xb, 0x6, "a5b20c13e57e30"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_simple={0x11c, 0x19, 0x0, 0x0, {{0xb}, {0x44, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x3, 0x8, 0x20000000, 0x2, 0x7}}, @TCA_DEF_DATA={0x7, 0x3, '&@\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x800, 0x4db, 0x7, 0x7f, 0x73}}, @TCA_DEF_DATA={0x8, 0x3, 'TEE\x00'}]}, {0xad, 0x6, "12c936e22e85916bba59e5e862b0d7ff6f6162496387d4f8ee52eeef9d04d9152ffd97f5726ec7e62a25d625708d7d10fc53dd809ba31fafbb79b3a132f3525a2c34a58cebcd6552a86f3a23c7d13a76e9807fcab825257f8b5aee2c17c977081e9b7b4de47fa7a3b8df2039ce59b9c3d0b51fabb0edf9f9d076e6a9aab5e46e101f93d7de37d99087f9282f80ed67b5df8b7e1522687f66bd434510136170c66045538e579672f301"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_tunnel_key={0x6c, 0x12, 0x0, 0x0, {{0xf}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @remote}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @loopback}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @loopback}]}, {0x9, 0x6, "74ffe41f6e"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}, @m_gact={0x12c, 0x7, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1c20, 0x1}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x11da, 0xffffffffffffffff}}]}, {0xe8, 0x6, "835ed38346ffea3d8246af2691d9db61f123b19b9b66ff74e6f2430ea8dee0d9726b2abeabc22bc4746b13ec998f90abcaea1fcee6d78273a2ba95c0ddba4c1cbc9bf7b0a52366e2ea1f3f113fae329f03b6e3f66e0435b482930a10de028c9c2611102e04ea6eda0a05f901168bd4d5b0ef49c8dfa1bae44b86b612fdddca424efb2cc5e7614ac20db2d9ae2010af5aa9171765804a4a335ab57feb6eddd282f9c704437779f9b4b3598c73821fad23fa2059ad9fad6c6c2a5d7831f3592c049ffe1c60c537326dcc27208ecb7e8adcc25a05eec0bcf996ae98107375eec33b4571c093"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}, {0x39f4, 0x1, [@m_nat={0x158, 0xb, 0x0, 0x0, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x9, 0xe7, 0x10000000, 0x5, 0x3f}, @local, @private=0xa010100, 0xff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x81, 0xe4, 0x7, 0x401, 0x8}, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xff000000}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x7a6, 0x9, 0x7, 0x3, 0xe5b1}, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x7, 0x6, 0x0, 0x3ff, 0xfffff000}, @multicast1, @loopback, 0xffffff00, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x1f, 0x8001, 0x6, 0x61, 0x5}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, 0xffffffff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x4, 0x2, 0x1, 0x333, 0x7f}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x22}, 0x0, 0x1}}]}, {0x3e, 0x6, "b6157f474d2a7755928966d5056d7ecc879a996c6b587b761edda3e40f01f1709959836d0559776e8874b37a032c33a7ba6f3eb06d06acee78a6"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_xt={0xb8, 0x1b, 0x0, 0x0, {{0x7}, {0x4}, {0x8d, 0x6, "704dfd50d8cacf7de4060ed7f76f5b30935b1ffc3410b2f455219025cf40aa72489f6886f0c2b977508f31edbb87ad9d8dc1c394b8f0cfd41a16b0b1e28dd8e01c67e18930b2e763505f3dcf9bf63fae75094a0b1b58a49ad63cbd05d420e9ecf7fc87dba81ee2d73df92b9567c05cd094368b6b4152fe6f94f3f53533fd5bb2b19ba20c34989fd220"}, {0xc, 0x7, {0x0, 0x603e22dcfb2bdb46}}, {0xc, 0x8, {0x3, 0x3}}}}, @m_police={0x253c, 0x19, 0x0, 0x0, {{0xb}, {0x1510, 0x2, 0x0, 0x1, [[@TCA_POLICE_AVRATE={0x8, 0x4, 0xff}, @TCA_POLICE_RESULT={0x8, 0x5, 0x9}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x21}, @TCA_POLICE_RATE={0x404, 0x2, [0x8f, 0x2, 0x17f, 0x8001, 0x2, 0xfffff5f6, 0x6, 0x3bdf, 0x2, 0x49b, 0x21000, 0x6, 0x3, 0x1d62, 0x2, 0x9, 0x1f, 0x9, 0x400, 0x8, 0x80000001, 0x5b81, 0xffff7fff, 0x2, 0x9cc, 0x101, 0x7fffffff, 0x1, 0x6, 0x200, 0x7, 0x5, 0x7, 0x3, 0x8e3, 0x3, 0x7, 0x295, 0x2485, 0x1, 0xcc, 0x7f, 0x7, 0x400, 0x0, 0x8, 0x20, 0x8, 0xfcda, 0x9, 0x1, 0xfffffff7, 0x2, 0x5, 0x3ff, 0xfffff001, 0xa16e, 0x7fff, 0x2, 0x53, 0x0, 0xffff, 0x1e, 0x1, 0xc1ce, 0xe3, 0xfff, 0x8d3, 0x4, 0x0, 0x1f, 0x7fffffff, 0x9, 0x1, 0x3ff, 0x81, 0x100, 0x4, 0x6, 0xffff, 0x8000, 0x161, 0xc000000, 0x3, 0x10001, 0x8, 0xcf2, 0x3047, 0x90, 0x1, 0x92e, 0x9, 0x0, 0x6, 0x6, 0x0, 0x8, 0x7, 0x2, 0xffffffff, 0x401, 0x8, 0x7ff, 0x7, 0x2a6, 0x7, 0x3, 0xfffff001, 0x101, 0x40, 0x6, 0x4, 0x7ff, 0x1f, 0x6, 0x8000, 0x1ff, 0x1f, 0x3, 0x2, 0x2, 0x6, 0x4d, 0x1f, 0x5, 0xdbbe, 0x4, 0x2, 0x8000000, 0xfff, 0x3, 0x7, 0x3, 0x7fff, 0x0, 0xc7bd, 0x2, 0x80000000, 0x1, 0x7fff, 0x0, 0x9, 0x8, 0x53d0, 0x2, 0x7, 0x7, 0x4, 0x0, 0x0, 0x10000, 0x1, 0x2, 0xa0000, 0x1f, 0x6, 0x0, 0x1, 0x1f, 0x80000000, 0xfffffff8, 0x1ff, 0xfffffffd, 0x401, 0x6, 0x100, 0x3, 0x101, 0x8001, 0x8000, 0xac8d, 0x1, 0x6, 0x5, 0x9, 0x3, 0x3ff, 0xfffffffd, 0x1, 0x400, 0xfffff001, 0x7f, 0x7, 0x8, 0x9, 0x5, 0x10001, 0x7fff, 0x96, 0x1, 0x8001, 0x9, 0x0, 0x7, 0x2, 0x663, 0x80000001, 0x1, 0x5d, 0x5, 0x2, 0x9, 0xb0df9415, 0x1, 0x1, 0xfffff000, 0x8001, 0x20, 0x7, 0x4, 0xc4, 0x1, 0x2, 0x8001, 0x5, 0x1, 0x6, 0xf0000000, 0xfffffffa, 0x1000, 0x8, 0x401, 0x4, 0x5edf, 0x7, 0x6, 0x8, 0x5, 0x0, 0x5, 0x4, 0x3ff, 0x8, 0x4, 0x800, 0x0, 0x0, 0x61, 0x9a3, 0xfffffffb, 0x0, 0x1, 0x33, 0x2, 0x0, 0x2, 0x5, 0x8, 0x20, 0x1, 0x9b, 0x3, 0xffff90d9, 0x36b3, 0x3, 0x100]}], [@TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_TBF={0x3c, 0x1, {0x8, 0x2, 0x8000, 0x2, 0x1, {0x8f, 0x2, 0x0, 0x6, 0x4, 0x6}, {0x82, 0x0, 0x57, 0x55, 0xba1, 0xfff}, 0x80, 0x51ce, 0x107d}}, @TCA_POLICE_RATE={0x404, 0x2, [0x9, 0x6, 0xd4, 0x1, 0x80, 0x7ff, 0x20, 0x1, 0x335bf437, 0x4, 0x4, 0x1, 0x7, 0xe4e, 0x3, 0x31, 0x7, 0x7ff, 0x1, 0x0, 0x354, 0x6, 0xfffffff8, 0x5, 0xff, 0x5f4e, 0x7, 0x7d, 0x3, 0xfff, 0x40, 0x2, 0x46, 0x9, 0x40, 0x8000, 0x9, 0xfffffffc, 0x80000000, 0xffffffff, 0x401, 0x9d54, 0x9, 0x8, 0x2, 0x8, 0x0, 0x0, 0x81, 0x5, 0x1000, 0x205a, 0xff, 0x80000000, 0x4, 0x22ac000, 0x3340037b, 0x0, 0x0, 0x3, 0x800000, 0x80000001, 0x200, 0xc5ec, 0x0, 0xc2, 0x4, 0x2, 0x1, 0x5, 0x4, 0xaa, 0x6, 0x7, 0xfff, 0x10000, 0x100, 0x8001, 0xf66, 0x5, 0x8001, 0x1, 0x4, 0x3, 0x0, 0x1, 0x1, 0x9c, 0x7, 0x5, 0x4, 0x5, 0x3, 0x401, 0x0, 0xfff, 0x8, 0x2000, 0x20, 0x3, 0x3, 0x1, 0x1f, 0x5e, 0x5, 0x9, 0x6, 0x5, 0x7fffffff, 0x66, 0x200, 0x10001, 0xff, 0x6, 0x1, 0xff, 0x8, 0x0, 0x81, 0x2, 0xe1, 0x41, 0x2b, 0x2, 0xffffffe1, 0x81, 0x80800000, 0x8, 0x2, 0xc, 0xc8, 0x88, 0xffffff81, 0x6, 0x5, 0x4, 0x101, 0x8, 0x0, 0x101, 0x20, 0x1, 0x10000, 0x8, 0x20, 0x0, 0x5, 0x8d, 0xe94, 0x1, 0x4, 0x9, 0x8f, 0x1ff, 0x8001, 0x7, 0x20, 0x101, 0x5, 0x3ff, 0x3ff, 0x101, 0x4, 0x8, 0x5, 0xfffffffc, 0x8, 0x0, 0x10001, 0x6, 0xffff, 0x2b45, 0x4, 0xa0, 0x3ff, 0x7, 0xa4, 0x4, 0x8, 0x1, 0xfffffffe, 0x7, 0x11b5667f, 0x0, 0x100, 0x6, 0x0, 0x9, 0x4, 0xfffffffd, 0x2, 0x401, 0x8, 0x1ff4, 0x10001, 0x0, 0x6, 0x0, 0x6e, 0xf6b, 0x80000001, 0x235, 0x2, 0x2, 0x10001, 0x1, 0x40, 0x8, 0x4, 0x9, 0xfffffffe, 0x1f, 0x7f, 0x7fffffff, 0xffffffff, 0x7, 0x10001, 0x3, 0x7, 0x42ee, 0x0, 0x2, 0x10000, 0x0, 0x9, 0x15a, 0x6, 0x1, 0x4, 0x0, 0x5, 0x1000, 0x7f, 0x7ff, 0x7, 0x9, 0x6, 0x7, 0x501, 0x4, 0x1, 0x8, 0x3, 0x3f, 0x5, 0x1b23, 0xc024, 0xc1, 0x4, 0x71a297f7, 0x2, 0x6, 0x100, 0xb5, 0x80000000, 0x2]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x200, 0x8001, 0x81, 0x0, 0x0, 0x625c, 0x9, 0x80000001, 0x0, 0xfffffff9, 0x3ff, 0x2737, 0x5, 0x8, 0x0, 0x40, 0x200, 0x8, 0x3f, 0x8, 0xfff, 0x8, 0x8000, 0x7, 0x1ff, 0x5e, 0x3, 0x7, 0x9, 0x0, 0x8, 0x7, 0x7, 0xfff, 0x80, 0x3f, 0x9, 0x2, 0x8, 0x4, 0x0, 0x800, 0xd5, 0x53, 0x1ff, 0x2, 0x4, 0x7, 0x1, 0x101, 0xffff, 0xef0f, 0x4, 0x8, 0x7fff, 0x81, 0x8, 0xada, 0x10001, 0x5, 0x26, 0x4d, 0x70, 0x1000, 0xb4, 0x101, 0x3171, 0x7fffffff, 0x0, 0x17, 0x80000000, 0x4, 0x3, 0x3ff, 0x101, 0x0, 0xc1c, 0x8, 0x1, 0x4, 0x10000, 0x100, 0x5, 0x401, 0x6f7, 0x2, 0x700000, 0x8, 0x3f, 0x8, 0x80000000, 0x1, 0x5, 0x1, 0x401, 0x400, 0x1f, 0x2, 0xffffffff, 0x400, 0x7, 0x1, 0x80000000, 0x6, 0x5, 0x200, 0xcf7, 0x80000001, 0x9, 0x3, 0x1, 0x4, 0x8, 0x4, 0x1, 0xff, 0x6, 0x3f, 0x7, 0x7, 0xdaff, 0x9, 0x0, 0x6, 0x0, 0xe57b, 0x0, 0x1, 0x10001, 0x8, 0x10001, 0x0, 0x2, 0x5, 0x2, 0x8, 0x1, 0xffffffff, 0x0, 0xaae, 0xffff0ba1, 0x2, 0x800, 0x0, 0x9, 0x7, 0x1, 0x80, 0x40, 0x6eb, 0x97d7, 0x20, 0x7fff, 0x9, 0x6, 0x8000, 0x80, 0x53, 0x1, 0x4, 0x1f, 0x20, 0x8, 0x8, 0x7, 0x7f, 0xfffffff7, 0x4, 0x400, 0x3f, 0x101, 0x0, 0x2, 0x101, 0xed8, 0xb0, 0x3, 0xfffffa86, 0x2d48, 0x438, 0x1, 0xe204, 0x1d, 0x9, 0x0, 0x7, 0x4, 0x4, 0x1, 0x3f, 0xfffffffb, 0xb500, 0xfffffff7, 0x2, 0x36, 0x0, 0x0, 0x101, 0x100, 0xe4, 0x8000, 0xffe00000, 0x101, 0x2, 0x3f, 0x7, 0x1, 0x0, 0x4, 0x5, 0x1, 0x0, 0xfff, 0x2, 0x4, 0x1, 0x7, 0x8, 0x7, 0x8, 0x0, 0x1, 0x10001, 0x2, 0x7fffffff, 0x7, 0x0, 0x2, 0xfffffff9, 0x3f, 0x0, 0x8, 0x4, 0xb705, 0x7, 0x3, 0x5, 0x8000, 0x2, 0x5, 0x400, 0x9, 0x3, 0xd27, 0x2, 0x2, 0x1, 0x10e1, 0x9, 0x83c, 0x400, 0x6, 0x0, 0x1000, 0x1, 0x800]}], [@TCA_POLICE_RATE64={0xc, 0x8, 0x445}, @TCA_POLICE_RESULT={0x8, 0x5, 0x2}, @TCA_POLICE_RATE64={0xc, 0x8, 0x7}, @TCA_POLICE_RESULT={0x8}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x6}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x3}, @TCA_POLICE_RESULT={0x8, 0x5, 0x4}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x20, 0xffffffffffffffff, 0x2, 0x6ab, 0x1, {0x1, 0x2, 0x8, 0x8, 0x5, 0x20}, {0xa0, 0x1, 0x1, 0x2, 0x7ff, 0x1}, 0x5f3, 0x101, 0x6}}, @TCA_POLICE_RATE={0x404, 0x2, [0x9, 0x3f, 0x3, 0x10000, 0x0, 0x10001, 0x1f, 0x6, 0x1, 0x8, 0x401, 0x3f, 0x75c6, 0x4, 0xfffffffc, 0xfffff000, 0x1ff, 0x69d4, 0x4, 0x28, 0x4, 0x2, 0x28, 0x0, 0x80, 0xaa3, 0xaa, 0x401, 0x3, 0x101, 0x5, 0x4, 0x5, 0x8, 0x7, 0xa22, 0x4, 0x80000000, 0x182c, 0x5, 0xf, 0x8, 0x0, 0x9, 0x1, 0x800, 0x5, 0x1, 0x7fffffff, 0x37f7, 0x7, 0x7, 0x10001, 0xa1, 0x7, 0x6, 0x2, 0x69, 0x8, 0x7a29, 0x8, 0x459b3e1d, 0x7, 0x4, 0x2, 0x1ff0, 0x0, 0x9, 0x4fd00000, 0x0, 0x7, 0x3, 0x8, 0x2, 0x378, 0x7, 0x4, 0x9, 0x3, 0x8000, 0x35c, 0x3, 0x7, 0xfffffff9, 0x80000001, 0x80, 0x7, 0x3, 0x6, 0x4, 0x80, 0x100, 0x8, 0x0, 0x10001, 0x3, 0x1, 0x8, 0x80, 0x4, 0x5, 0x825, 0x3ff, 0x3, 0x7fffffff, 0xfffffff9, 0x2, 0x7, 0xf0f, 0x1, 0x9, 0x7ff, 0xfff, 0xffffffff, 0x1, 0x100, 0x1000, 0x3, 0x8001, 0x2, 0x8001, 0x4, 0x7f, 0x9, 0x4af, 0xc4, 0x5, 0x3f00000, 0x100, 0xfff, 0x2, 0x5, 0xff, 0x1, 0x400, 0x0, 0x401, 0x0, 0x8, 0xffff, 0x4, 0x0, 0x7, 0x3c, 0x4, 0x8, 0x6, 0x56d, 0x800, 0x0, 0x2, 0x0, 0x6, 0x3, 0xc0000000, 0x9, 0x8e, 0x7, 0x1000, 0xfffff1ef, 0x2, 0x8, 0xda, 0x40, 0xfff, 0xee3, 0x10000, 0x6, 0x4, 0x1f, 0x8000, 0x9, 0x4, 0x5, 0xabe4, 0x9, 0x80000001, 0xfffffffa, 0x1, 0x7, 0x3, 0x6, 0xfffffff7, 0x18, 0x1, 0x3ff, 0x5, 0x7f, 0x40, 0x10000, 0x6, 0x2, 0x4, 0x8000, 0x5, 0xe68, 0x4, 0x9, 0x8001, 0x81, 0x4, 0x2, 0x8, 0x174b5c01, 0xf35, 0x1, 0x5, 0x0, 0x8000, 0x4, 0x9, 0x446, 0x950, 0x200, 0x582, 0x400, 0x0, 0x7, 0x5, 0x7ff, 0x5, 0x1, 0x6, 0xab1a, 0x54618d6f, 0x4, 0x800, 0x871, 0x20, 0xff1c, 0xc0cc0000, 0x8001, 0x18, 0x5, 0x5, 0x5, 0x80, 0x80000001, 0x7ff, 0x401, 0x1, 0xfffffffe, 0x5, 0x5, 0x7fffffff, 0x3, 0x2800, 0x0, 0x6, 0x800, 0x837e, 0x9, 0x3ff, 0x6, 0x8, 0x5]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7c}, @TCA_POLICE_RESULT={0x8, 0x5, 0x1f}, @TCA_POLICE_RATE64={0xc, 0x8, 0x7}, @TCA_POLICE_RATE={0x404, 0x2, [0x8, 0x101, 0x8, 0x1, 0x800, 0x9, 0x2, 0x8000, 0x4, 0x8000, 0x3f, 0x6ebb, 0xff, 0x3ff, 0x7f, 0xfff, 0x7, 0x7, 0x80000000, 0x5, 0x100, 0x5, 0x401, 0x80000000, 0x10000, 0x5, 0x2d7, 0xffffffff, 0x7, 0x7, 0x800, 0x9, 0xab2b, 0x6, 0x7, 0xffff, 0x12000, 0x0, 0x7fff, 0x1000, 0x100, 0x401, 0xb9b4, 0x2, 0x8, 0x20000000, 0x0, 0x6, 0x9, 0x9, 0x1000, 0x9, 0x1, 0x1, 0x400, 0x4, 0x5, 0x5, 0x3, 0xff, 0x1, 0x3, 0x7fffffff, 0x5, 0xfffeffff, 0x9, 0xbc4e, 0x2, 0x2, 0x5, 0x4, 0x1, 0x4, 0x800, 0x9, 0x3, 0x6, 0xec5e04b, 0x8000000, 0x7, 0x109, 0x5, 0x6374, 0x3, 0xc6c, 0x95, 0x2, 0x4, 0x1, 0x401, 0x80, 0x0, 0x3b1, 0x9, 0x9, 0x3f, 0x8, 0x3, 0x7, 0x6, 0x1000000, 0x80000000, 0x4, 0x3, 0x1, 0x2, 0x8000, 0x0, 0x1, 0x1, 0xffff, 0x4, 0xffffffff, 0x7a, 0x1, 0x3f, 0xdf, 0x4, 0x80000001, 0x1, 0x7, 0x20, 0x8a, 0x30, 0x7, 0x80, 0xffffffff, 0x7f, 0x3ff, 0x9, 0x7fff, 0x9, 0xffff3e93, 0x1, 0x81, 0x1, 0xff, 0x10000, 0x31800000, 0x80000001, 0x5, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x6, 0xe3e, 0x5b800, 0x20, 0x0, 0x84, 0x5, 0x5, 0x8001, 0x3, 0x2, 0x4, 0x9, 0x7f, 0xe, 0x8001, 0x5, 0x0, 0x1ff, 0x9, 0x0, 0x6, 0x452, 0x1f, 0x1, 0x8, 0x3, 0x0, 0x7fff, 0x2, 0xfffffff9, 0x800, 0xff, 0x1, 0x9, 0x3, 0x3, 0x3, 0x0, 0xb9, 0x401, 0x5, 0x401, 0x81, 0x5, 0xffffffff, 0xffffffff, 0x8, 0x3, 0x15, 0xf4, 0x1, 0xffffffff, 0xd70, 0x3, 0x2c, 0xfff, 0x80000001, 0x3, 0x7, 0xfffffff9, 0x400, 0x3, 0x4, 0x7, 0x1, 0x8, 0x3, 0xaf, 0x1, 0x7fffffff, 0x2, 0x4397, 0x3, 0x80, 0x7, 0x20, 0xfffff7c0, 0x9, 0x7, 0x2, 0xfffffffa, 0x5, 0xfffffffe, 0x8, 0x722, 0x3, 0x6, 0x5, 0x6, 0x1, 0x9, 0x900, 0xb58b, 0x1000, 0x8000, 0x6, 0xffffff84, 0x5, 0x3, 0x7, 0x9, 0x5480, 0x7, 0x3, 0x1, 0x7ff, 0x0, 0xfffffff8, 0x8]}]]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_connmark={0xe0, 0x5, 0x0, 0x0, {{0xd}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x5, 0xd2b, 0x0, 0x343d, 0x4f}, 0x5}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x100, 0xfe, 0x4, 0x0, 0x3}, 0x1}}]}, {0x78, 0x6, "a8d4fb0c82f418ff6d2931761fc137fba532c0efb6ed506f522edf6098da639053bb5a8871b921990a6f960d38f9da8d95ded1484e785ceaca884b227319842176f0d800dea3bf12c519fc4861f1c850229915e89b625f39ce74c3d816633e1bfe30d7f093e0ac46473441e61703062f2828f0fb"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_mpls={0xf4, 0x1c, 0x0, 0x0, {{0x9}, {0x24, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5, 0x6, 0x1}, @TCA_MPLS_PROTO={0x6, 0x4, 0x88e7}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_LABEL={0x8, 0x5, 0xa7dc0}]}, {0xa6, 0x6, "ec064eb732227b028f9e0869a8fe7d17135c56bcd44c1d21bb0bf91e6d5a5c051403a29c86e1a9c92e3847c3cf8651e229a1ecda430efa18f5622791d9d0a49754893f88c36478d0a1c4054c49a699c09648c776d88978986a92cf0321a821893c6e5f365383ec946951b8bcabec1321d7369976766fc20433bcee153dab045845ee3fc1717022b78a13f03d7d604dd1fe7199429ab3153460bf86c982cadc0487af"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x5}}}}, @m_mirred={0x1090, 0xd, 0x0, 0x0, {{0xb}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x98, 0x5, 0x3, 0x4}, 0x2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x2, 0x4, 0x1, 0x9, 0x9}, 0x16f6523f74877c78}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x7fff, 0x6, 0xffffffffffffffff, 0x6, 0xff}, 0x4}}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_bpf={0x40, 0x19, 0x0, 0x0, {{0x8}, {0x14, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x3}]}, {0x8, 0x6, "ead8a2b3"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}, {0x7c8, 0x1, [@m_mirred={0x14c, 0x5, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x9, 0x0, 0x7, 0x9, 0xfffffffd}, 0x3}}]}, {0x100, 0x6, "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"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_bpf={0xbc, 0x5, 0x0, 0x0, {{0x8}, {0x4}, {0x94, 0x6, "742a0b237d353525e06512d370efc819d821377d8ab197d938660a6704233139aa4165d74a678dec38e080e85db3b66389c892d61e5c938c5e6072644241d0bab4fff5591bc2ad55607df6c34e8edba4daa6aeaa10cbcacf51b29dc2c5fc0cd4f8daf81317292f7aaab4349d7e712108a594bb2afe4cd3706b288dd1b82fd2dbcb9f9f37b4eaf733ac7c0a1f148e33c8"}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}, @m_ife={0x144, 0x2, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_IFE_SMAC={0xa, 0x4, @random="64f35bcff5d0"}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x3f, 0x9, 0x6, 0x8f, 0x10000}}}, @TCA_IFE_DMAC={0xa, 0x3, @remote}, @TCA_IFE_METALST={0x14, 0x6, [@IFE_META_TCINDEX={0x6, 0x5, @val=0x6}, @IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_SKBMARK={0x4, 0x1, @void}]}, @TCA_IFE_METALST={0x14, 0x6, [@IFE_META_TCINDEX={0x6, 0x5, @val=0x6}, @IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_PRIO={0x4, 0x3, @void}]}]}, {0xbf, 0x6, "22ffabfd802d36c463ad6baa088714f11514befc9cfbc88ea8b069f085f603279312b2c1d7acc21c4ea0f33428b31fb7c4af3274c9e1ea337c863e7f1473f93f50086d86870601464d479343c0b99d4279095622dc9bd46f9695091f39d195a690208720cfc1cd9c7b5b4461ec7d71c3c5f4f6fffad7a21a86cee0e93f6dc238940d42bec193de657b80588fca310fdb897667034f573af550a7076364516612662e1f12619813de1379bc783cfa567585e36765c5a36c4a0fc4d4"}, {0xc, 0x7, {0x74e66a6b969427e9, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_skbmod={0x124, 0x11, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x5}]}, {0xef, 0x6, "e861312ffbc8fcbb0c912edfc95f22db9e67838522174b9cb9437002cd3fb1858911976924fbe7faa0a2c918a2b892d218891c21383c32d220a9f4bb84dadf4d0fdb49ca903d726e85fb825908f8575aeccaf92a877cdb57ce2313fc6e9b33cbd78208e2de8ce21b9360a6bfabd685907452426e6371e58af135ec8c5957ad15756f4d3ecb98ec9a901e4e181d095ef9516a9ebd080d2929524dcfba6c5f5a617568cc4f37400b94044a8d095210be9d0cdb7a29ad1bee478be6715ac71cf298192690205cfcbe7459391bdedd51427456ad1d528e8a6b2567b3b6f177ef04e3fb3fab7bff2888c80caea9"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_ctinfo={0xfc, 0x1c, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x70}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x2}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x7}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x1}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0xf8800000}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x87d2}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x3}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x2}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8}]}, {0x86, 0x6, "8a67016bff6dad1899e5567ddf4db13d0982ffffa244afb6dfbf424c46bc7eb11619d031d1ee145cced30d3a80d354a0c5703ad6bf470cda5191214c12c95cdf85e4d04b8ab7c2b7227c7a7a01ed873faa4717412bbd8c10d5956040cacfb3381ba1135288610e40ed8296dab75dc71c8f4ced3ac1bb672d872e01cb3e6a6ef6ead1"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_ife={0xc0, 0x1c, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_IFE_METALST={0x38, 0x6, [@IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_SKBMARK={0x8, 0x1, @val=0xfffffff9}, @IFE_META_PRIO={0x8, 0x3, @val=0x7fffffff}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_SKBMARK={0x8, 0x1, @val=0x8}, @IFE_META_PRIO={0x8, 0x3, @val=0x5431}, @IFE_META_SKBMARK={0x8}]}, @TCA_IFE_DMAC={0xa, 0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, @TCA_IFE_TYPE={0x6, 0x5, 0x9}, @TCA_IFE_TYPE={0x6, 0x5, 0x1}, @TCA_IFE_TYPE={0x6, 0x5, 0x6e}]}, {0x3c, 0x6, "c73aa4a0a948aa40a04d0d29bc3770cb42a96d4caad7a8a84fc6b8dbdb6d81113df8d2a23eae22f448423014a8f8a4afd6d1281763f78ce8"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_mpls={0x198, 0x4, 0x0, 0x0, {{0x9}, {0x74, 0x2, 0x0, 0x1, [@TCA_MPLS_LABEL={0x8, 0x5, 0x6472c}, @TCA_MPLS_TC={0x5, 0x6, 0x6}, @TCA_MPLS_LABEL={0x8, 0x5, 0x7934f}, @TCA_MPLS_TC={0x5, 0x6, 0x7}, @TCA_MPLS_PROTO={0x6, 0x4, 0x6003}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x8, 0x20, 0x7, 0x7, 0x3}, 0x2}}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_LABEL={0x8, 0x5, 0xce779}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x20, 0x4, 0x3, 0x9, 0x7fffffff}, 0x54a78fa99ff81c4e}}]}, {0xfb, 0x6, "2f001b85f2f74adadff9781c9807d38b7b7772770bfb52d265cddf22a81b1692288811eed87e567403a320dc6609c3edd2a4595c87ae80d2bbd27b937bf1566b24c815235f47afde2c42ddfa2cb61fd9546d798ce8b5f4dc7c2d6aa13af9261c743737a70a7c0f900e822e1de26ec98ab999a023b5437652301143dddd92dbe6bcfc2e415f0992484d07c1adc6dec9d3cd4f626787ddbeeb96dc0d811d608f9239d8ad7864ab5626738a4e9cbe31dabbe03850fb669457ad7e41729d697777f7ff7e5391f92a5368e865c38308383fc91e9dab44d73bed6e609176f4603399353f82d2fd73a0a97c877a6238359660b3ebd5b27b25faa4"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}, {0xc4, 0x1, [@m_skbedit={0xc0, 0x0, 0x0, 0x0, {{0xc}, {0x1c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x3}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x1897}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x1, 0x2}}]}, {0x7c, 0x6, "78cc8dc374b561fc193d353897472b8ae27c66dc418cc95bc6be86b46632dcde99d0651f77d8f418a5cbc87e4e71c650ba73616241f0e96d1e51bfb22281d5af351994def07783901d3b40f1b6977feef62dca5a387417b5a20c96f5cac0ebbb23b0b00fb15798e05d0a8183333c92f44aaeebc917d429ac"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}, {0x4124, 0x1, [@m_xt={0x1f4, 0x1, 0x0, 0x0, {{0x7}, {0x144, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8, 0x2, 0x3}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_TARG={0x11d, 0x6, {0x0, 'security\x00', 0x8, 0x7, "c9249410a486bb8232893442fa74c4b4549dadc152c6937727d4702d658f5ac56d6ff19b5ff44ebd6f445ec308027a7d8a04b29c1279b51a20b87b24c4c7fe6fa7cda94966acabd6f837ae55304fff155df3d8534d871b2e2b8c65d70e4df371c158760d4f574b8ca86fe85bb57a8a3d8d17bbbfc89e6a40d9243b459d722b1b59e1aa0150be336e4a7d1eece34d9fc84a9a44e6212a0c911e3a009704ba12d898e7e8b7bcd3a7706c8db0a015ab5b7e04478ceccc18a0fe1b28a216b08589d90feb70b1f1dcfec70d406dc9777f2927953546d66b3a022157d1f5038b6c44d16c2fee1df8a048b247d197281d0f90e53a4108"}}, @TCA_IPT_INDEX={0x8, 0x3, 0x1}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}]}, {0x8c, 0x6, "0758a61166d0d8e7e0742ae3c30028a22d0dfaf4d66faa34f2700ffea136a863fcf00eb043216dc05998e8b349337062706293c48d7fde3076c49df1f244e02b591acec38048f0d38d4b7684788aef42ede05f2f58b42b828c268ff3123b43444a98855af54674560b4f64abf6fcbde368d0f1bc7f1ebcca17a745cf3d0666a216ebf8a91d555f62"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x5, 0x2}}}}, @m_simple={0xe4, 0xa, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x400, 0x3, 0x3, 0xa6, 0x4}}, @TCA_DEF_PARMS={0x18, 0x2, {0x7, 0x6, 0x6, 0xfffff000, 0x400}}, @TCA_DEF_DATA={0x9, 0x3, 'pptp\x00'}]}, {0x7b, 0x6, "027242ddd4f38461e104c216dc41b3b68dd5f97fddce3d8b804a2d1c1da1691165320cdee161643b996a649cc0c6b7598b00145f8c56f9c6a945a7842ba4f6c644c05b8f8be2552fddf1d704d00084338d7212f9094ce3f35790ed768f107e00b8bb846307a234fcdc1906f215044d636340a1d39f0f06"}, {0xc}, {0xc}}}, @m_tunnel_key={0xcc, 0x11, 0x0, 0x0, {{0xf}, {0xc, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @multicast1}]}, {0x92, 0x6, "0f077b2957cbaa1c577eabae806855153bb4c5af18f76121e32146919cf2a3f3e69c25501b3f7a1016f912e996177b158418ef2ca569f044b727ebda53e82dc0f237d68fe5fab1fb48b7e49f70001f29dc69349d195e496adfe56c1a7f16915d865cf025f5be131fae191922c867ad036fd193f69e14a44ef323574d79a9056472d156b5671f3ef83a0668bd7922"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_tunnel_key={0x148, 0x7, 0x0, 0x0, {{0xf}, {0x24, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @multicast1}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x3}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0xa743}]}, {0xf5, 0x6, "aae8754c4ca6fa1d23ba422b8e24487049130e433a495784a64933421b339675b2e6c333fdb67e5a9e2f93c1eff918edb00a81281bba685b0d18dfdf29fa6ce460730458f068c285494e1c60b5ff81102432da7752787dda95c7cd8d024884045ce8ce07870bd6c6cacfe8ea5883c3e35ce13b2ae07292d18255bb07d380e5e571c40ed9c5602cb0d2edf93d0583830a1af14bb8c978984ead4dea29a0b3ee01f854e08c45d6442df645d5bc57040918344a746f6c3b0336a8d98ec56f307c2f439494acbbc3c677ba6f08595075eea90c34cbe29d2a9b328f007e862dd8e88e3bde94f04c956e53ca5a740cbf3f13d53d"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_ctinfo={0x9c, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x3}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x51d}, @TCA_CTINFO_ACT={0x18, 0x3, {0x57, 0x7fffffff, 0x20000000, 0x200}}, @TCA_CTINFO_ZONE={0x6}, @TCA_CTINFO_ACT={0x18, 0x3, {0x974c, 0x0, 0x3, 0x8001, 0x7}}]}, {0x28, 0x6, "d9cb0de95ef405db3cc6cbffe2d41dfe988e32e1785e3268dc05d439c57d88e1aff32f2b"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_pedit={0x3ae0, 0x9, 0x0, 0x0, {{0xa}, {0x3aa0, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xec8, 0x4, {{{0x2, 0xff, 0x4, 0x6fa, 0x401}, 0x40, 0x20, [{0x1, 0x7, 0x80000001, 0xd5d5, 0x8, 0x1f}, {0xea, 0x20, 0x68de357b, 0x4, 0x42421d93, 0x4}, {0x7a2, 0xcf4b, 0x7, 0x702, 0x3, 0x9}, {0x9, 0x4, 0x2, 0x1ff, 0x7c, 0x800}, {0x9, 0xff, 0x8, 0xa4, 0x4}, {0x100, 0x3, 0xeb9, 0x9, 0x8000, 0xa55}, {0x99, 0x40, 0x9, 0x6, 0x6, 0xff}]}, [{0x1, 0x81, 0x7, 0x7, 0x8, 0x1000}, {0xffffff2b, 0x4, 0x3, 0x80000001, 0x0, 0x10000}, {0x80000001, 0x7bfa, 0x3, 0x8001, 0x4, 0x100}, {0xdde0, 0x7, 0x0, 0x8000, 0x918, 0x20}, {0x90f, 0x2, 0x1f, 0x8, 0x10000, 0x400}, {0xfffffffb, 0x5, 0x8, 0x2, 0x7, 0x2}, {0x0, 0x1, 0x1034, 0xffffffff, 0x9e28, 0x7fffffff}, {0x8, 0x7e4, 0x8, 0x1ff, 0x3a, 0xff}, {0x8, 0x8, 0x8, 0x1c8457f5, 0x0, 0x80000000}, {0x800, 0x1, 0xffffffff, 0x8, 0x7, 0x2}, {0x5, 0x401, 0x1, 0x7f, 0x80000001, 0x400}, {0x7, 0x7, 0x7, 0xa22d, 0x4, 0x2}, {0x7, 0x3, 0xff, 0x4, 0x9, 0x9}, {0x7, 0x4, 0x10001, 0x9, 0xffff7fff, 0xbb2}, {0x501e, 0x1000, 0x8, 0x7fff, 0x6, 0x1}, {0x2, 0x7, 0xc, 0x1, 0x4, 0x3}, {0x8, 0x8, 0x1, 0xffff, 0xfffffffc, 0x8}, {0x7, 0x4, 0x8, 0x3ea, 0x200, 0xfffffffc}, {0x3ff, 0xffffff67, 0xfffff69c, 0x8, 0x3, 0x3}, {0x25, 0x5, 0xa7, 0x1, 0x5, 0x5e5}, {0x0, 0x7, 0x6, 0xe6a, 0x1ff, 0xfffffffa}, {0x1, 0x8000, 0x1, 0x5, 0xe1}, {0x9, 0x75e, 0x8055, 0x4, 0x5}, {0x6b60, 0xa6, 0x0, 0x10000, 0x9, 0x6}, {0x0, 0x6, 0xfffff000, 0x26, 0x8, 0x3}, {0x5, 0x0, 0x8, 0x8, 0x0, 0x4}, {0x2, 0x2, 0x3, 0x7, 0x1, 0x7}, {0x5, 0x6, 0x9b, 0x8, 0x9, 0x6}, {0x401, 0x1, 0x2, 0x2, 0x7fff, 0x5}, {0x80, 0x2, 0x10001, 0x80000000, 0x9, 0xfff}, {0x81, 0x7, 0x7ff, 0x0, 0x2, 0x7}, {0x72, 0x3, 0x80000001, 0x1ff, 0x7, 0x200}, {0x400, 0x8, 0x5, 0x20000000, 0x9, 0x7}, {0x6, 0x401, 0xffffffff, 0x9, 0xfffffffe, 0x7ff}, {0xfffff937, 0xc8ba, 0x3, 0x1, 0xffff, 0x1ff}, {0x400, 0x81, 0x9, 0x4, 0x1ff, 0x3}, {0xfffffffd, 0x12000000, 0x4, 0x5, 0x8000, 0x4}, {0x1bf, 0x7, 0x8, 0x0, 0x1, 0x9}, {0x4, 0x5, 0x9, 0x400, 0x9, 0x7fff}, {0x80000000, 0x7ff, 0x86a0, 0x8, 0xffffff3f, 0xb12d}, {0x80000000, 0x7, 0x987, 0x3f4d7d12, 0x7, 0x3}, {0x5b17, 0x80000000, 0x10001, 0x1, 0x7ff, 0x7bc7}, {0x2, 0x800, 0x101, 0x8001, 0x8}, {0x622, 0x4, 0x2, 0x8, 0x6b83}, {0x6, 0xffff8000, 0x6, 0x7, 0x9, 0x6}, {0x20000000, 0x97, 0x0, 0x5, 0xfffffffc, 0x7}, {0x7, 0x7, 0x0, 0x8, 0x1ff, 0x8}, {0x7ff, 0x8, 0x1, 0x3, 0x9, 0x9}, {0x8001, 0x6, 0x0, 0x4, 0x400, 0x292e}, {0x9, 0x5, 0x1, 0x1, 0x7, 0x1}, {0xafe, 0x3ff, 0x80000001, 0x20, 0x1f}, {0xfff, 0x1, 0x9, 0x2a, 0x5, 0x1}, {0x509f, 0x6, 0x2, 0x400, 0x2, 0x40}, {0x4, 0x40, 0x80000001, 0x3, 0x1, 0xac7}, {0x40, 0x10000, 0x10000, 0xca, 0x9, 0x3a5}, {0x6, 0x3f, 0x7f, 0x7, 0x8, 0xfffff001}, {0x1, 0x4a, 0x7, 0xec, 0x4, 0xb2}, {0x1ff, 0x6, 0x0, 0x10001, 0x200, 0x8}, {0x6, 0x3, 0x5, 0x2, 0x86c, 0xfff}, {0x4, 0x9, 0xfffffffe, 0x7fffffff, 0xffff, 0x101}, {0x40, 0x2, 0x81, 0xdf, 0x8a1}, {0x800, 0x401, 0x1, 0x8, 0x58d59e4f, 0xffff}, {0x9, 0x0, 0x45, 0x4, 0x1, 0x800}, {0x2, 0x18f, 0x5, 0x40, 0x8, 0x42c}, {0x8, 0x200, 0x4, 0x20, 0x0, 0x8}, {0x53, 0x75d, 0x6, 0x95b, 0x2}, {0x101, 0x81, 0x2, 0xf8000000, 0x1, 0xfffffff8}, {0xeab, 0x4, 0x401, 0x8, 0x2}, {0xfffffffe, 0x3ff, 0x2, 0xffff892a, 0xf4d0, 0xfff}, {0x4, 0x9, 0x8000, 0x5c9, 0x0, 0x40000}, {0x1ff, 0x3, 0x7ff, 0x2, 0x1000, 0x2}, {0x8, 0xfffffff7, 0x1, 0x2, 0x1, 0x3}, {0x9, 0xdf73, 0xffffd78b, 0x80000001, 0x400, 0x80000000}, {0x3f, 0x78ea1b89, 0x1, 0x15, 0x9, 0x396a81ee}, {0x0, 0xdfc, 0x1, 0x3, 0x0, 0x9}, {0x25, 0x74, 0xfff, 0x8, 0x84, 0x53}, {0x1, 0x0, 0x2, 0x12, 0xa06, 0x10000}, {0x5, 0x8, 0x81, 0x1, 0x10000000, 0xfffffff9}, {0xce4e867, 0x80, 0x1687, 0x80, 0xfffffff7}, {0x5, 0xfffffffd, 0x1574e4bc, 0x6, 0x80, 0x1000}, {0x3, 0x2, 0xe219, 0x2, 0xcbf, 0x9}, {0x5, 0x3, 0xffffffff, 0xc6, 0x3, 0x8}, {0x6, 0x7, 0x4, 0x0, 0x7, 0x3}, {0x1, 0xfffffbff, 0xfffffffa, 0xfff, 0x2a1e, 0x6}, {0xfffffff8, 0x400, 0x40, 0x1ff, 0x3, 0x4}, {0x10000, 0x6, 0x80000000, 0xfffffff7, 0x0, 0x5}, {0x81, 0x485, 0x8, 0x2, 0x2, 0x8000}, {0x7ff, 0x8597, 0x3, 0x5, 0x8, 0x8}, {0x7f, 0x7f1, 0x4d5, 0xffffffff, 0x4e30e948, 0x1}, {0xa, 0x7fffffff, 0xba54, 0x40, 0x1f}, {0x401, 0x0, 0x5, 0xaa, 0x5, 0xfffffffe}, {0xfffffff8, 0x7, 0x6, 0x7, 0x9, 0x16}, {0x4, 0x7, 0x1, 0xfff, 0x7, 0x8}, {0x1000, 0x6, 0x538, 0x3, 0x6, 0x40}, {0x7, 0xfbb0, 0x4000000, 0x3, 0x2, 0x6}, {0x40, 0x1, 0x6687, 0xfffffffe, 0xfffffe00, 0x7}, {0x5, 0x3, 0x6, 0x7, 0xf9, 0x1}, {0x4, 0xeb9, 0x7, 0x8, 0xab, 0x5}, {0x6, 0x59aada9b, 0x20, 0x9, 0x0, 0x2}, {0x2, 0x8, 0x1, 0x1, 0x1ff, 0x5}, {0x9a2, 0x8, 0xf2, 0x9, 0xff800, 0x9}, {0x7ff, 0x3, 0x3, 0x400, 0xdc, 0x8}, {0xffffffff, 0x2, 0xffffffff, 0x2, 0x6, 0x5}, {0x3, 0x7fffffff, 0xffff, 0x7fff, 0xb1, 0x4}, {0x5c, 0x1, 0x7e9b, 0x3, 0x19, 0x6}, {0x8001, 0x79cc0db8, 0x7f, 0x81, 0x4}, {0x8001, 0x1, 0x84, 0xfff, 0x5, 0xc1d}, {0x4, 0x5, 0x4, 0x0, 0x1000, 0x9}, {0x336d, 0x441d, 0x6, 0x69, 0xfffffffa, 0x7}, {0x1000, 0x6, 0xffff, 0xf79f, 0x1ff, 0x80000000}, {0x3, 0x8, 0x1, 0x8001, 0x9, 0x3}, {0x10001, 0x4, 0x1, 0xf4, 0x1d, 0xffffffff}, {0x80000000, 0x4, 0x1, 0x4, 0xffff, 0x1}, {0x8, 0x10000, 0x57, 0x3, 0x6, 0x2}, {0x80000001, 0xecc, 0x20, 0x3, 0x5, 0x1}, {0x0, 0x3, 0xd222, 0x101, 0x59, 0x1}, {0x7f, 0xc738, 0x9, 0x1, 0x101, 0x7}, {0x8, 0x4, 0x0, 0x67c, 0xffffffff, 0x1f}, {0x1, 0x3ff, 0x1, 0x7ff, 0xfa, 0x1}, {0x0, 0x86, 0x81, 0xa3, 0xbd, 0x6}, {0x5, 0x3, 0x1fa, 0xffff, 0x1, 0xab}, {0x0, 0x1, 0x5, 0xfffffffd, 0x1, 0xe9}, {0xda, 0x2, 0x7ff, 0x100, 0x4, 0x6}, {0x10001, 0x8, 0x6, 0x40, 0x3759, 0x64}, {0x7fffffff, 0x4, 0x7, 0xffffff4c, 0x7f, 0x3}, {0x7, 0x401, 0x3, 0x10000, 0x1, 0x6}, {0x3ff, 0xfffff3a7, 0x5, 0x8, 0xd56, 0x6}, {0x60091da, 0x1, 0x4, 0x1aab, 0x9, 0x3ff}], [{}, {0x4, 0x1}, {0x5, 0x1}, {0x3}, {0x1}, {0x60e07f64dd4e3152}, {0x2, 0x1}, {0x3, 0x1}, {0x2}, {}, {0x4, 0x1}, {0x3}, {0x4}, {0x2}, {}, {0x1, 0x1}, {0x4}, {0x4}, {0x5, 0x1}, {0x4}, {0x5}, {0x4, 0x1}, {0x1}, {0x4, 0x1}, {0x3, 0x1}, {}, {0x2}, {}, {0x1}, {0x5}, {0x4}, {}, {0x3}, {0x3}, {0x1a474b47b578d5ff, 0x1}, {0x0, 0x1}, {0x2}, {0x2, 0x1}, {0x2, 0x1}, {0x5, 0x22ead0bfb6cd700d}, {0x5, 0x1}, {0x0, 0x1}, {0x5}, {0x3}, {0x2}, {0x1, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x4}, {0x1}, {0x5, 0x1}, {0x3}, {0x4, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {}, {0x2}, {0x3}, {0x4}, {0x1, 0x1}, {0x6, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0xa65499a3136e5612, 0x1}, {0x1}, {0x2, 0x1}, {}, {}, {0x1, 0x1}, {0x4}, {0x5}, {0x1}, {0x3}, {0x3, 0x1}, {0x5, 0x1}, {0x3}, {0x4, 0x1}, {0x2, 0x1}, {0x5}, {0x1, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {}, {}, {0x3}, {0x1, 0x1}, {0x5}, {0x4, 0x1}, {0x3}, {0x2, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x1}, {0x2}, {0x5, 0x1}, {0x3}, {0x1, 0x1}, {0x3}, {}, {}, {0x2, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x5}, {0x2}, {0x5}, {0x4, 0x1}, {0x0, 0x1}, {0x1}, {0x3}, {0x6}, {0x3, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x6, 0x1}, {0x1}, {0x3, 0x1}, {0x7, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x5}]}}, @TCA_PEDIT_PARMS_EX={0xe68, 0x4, {{{0x5, 0x9, 0x7, 0x8, 0x800}, 0x0, 0x3, [{0x8, 0xfffffffa, 0xffff, 0xdb, 0x1, 0x4}, {0x0, 0x5, 0x1ff, 0x401, 0x10b, 0xa212}, {0x20, 0x0, 0x3ff, 0x219, 0x3}]}, [{0x3, 0x101, 0x1ff, 0x32e0, 0xdc5, 0x1f}, {0x7f, 0x1, 0x8001, 0xfffffff9, 0x6}, {0x97, 0xea3, 0x3, 0x80, 0x8, 0x1}, {0x403, 0x2, 0x7f, 0x0, 0x3, 0x20}, {0x7fff, 0x0, 0x0, 0x781b, 0x1f, 0x34c}, {0x9, 0x1, 0x6, 0xffffffff, 0x5, 0x7}, {0x1ff, 0x8000, 0x7, 0x2, 0x7, 0x100000}, {0x2, 0x3f, 0x8, 0x2, 0x6, 0x1}, {0x800, 0x6, 0xc9, 0x7, 0x2, 0xfc}, {0x2f, 0x9, 0xffff, 0x1ff, 0x0, 0x7fff}, {0x4, 0x4, 0x80000001, 0x1, 0x8, 0x2}, {0xc42, 0xae, 0x8000, 0x8, 0x7ff, 0x3}, {0x1f, 0xffffd6ad, 0x80, 0x1ff, 0xdb2}, {0xc885, 0x20, 0x0, 0x6, 0x9, 0x81}, {0x3, 0x6b, 0x8000, 0x0, 0x800, 0x5}, {0x7, 0x3, 0x9, 0x8000, 0x5, 0x3}, {0x1, 0x0, 0x7fff, 0x8f, 0x2, 0x4}, {0x8, 0x8272, 0x5, 0xa362, 0xfffffffe, 0x400}, {0x4, 0x9f, 0x9, 0x2, 0x3, 0x3}, {0x4, 0x1, 0x6, 0x1, 0x5, 0xe000000}, {0x800, 0x9, 0x100, 0x7, 0x0, 0x3}, {0x5, 0x40, 0x80000001, 0x2, 0x4, 0x4}, {0x5, 0x3, 0x7fffffff, 0x5, 0x80000000, 0x4}, {0x9, 0x80000000, 0x100, 0x0, 0x5, 0x7ff}, {0x9, 0x6, 0x1, 0x8, 0x200, 0x8}, {0x4, 0x4, 0x3, 0x7, 0x7ff, 0x7}, {0x3, 0x1ff, 0x6, 0x6, 0x3, 0xfffffffa}, {0x8001, 0x2, 0xfffffff7, 0x100, 0x0, 0x1}, {0x2, 0x1bb, 0x61b6, 0x40, 0x24e5, 0xff}, {0x1f, 0x10000, 0x2fe6, 0x8000, 0x9, 0x800}, {0xffffffff, 0xbb, 0xfffffffa, 0x800, 0xffffffff, 0x6}, {0x1, 0x40, 0x80000000, 0x80, 0xa4d, 0x1}, {0x4, 0x9, 0x4, 0x5, 0x7db, 0x5}, {0xc35, 0x362, 0x3, 0x80000001, 0xffffffff, 0x7}, {0x37, 0xea5, 0x80, 0x7fff, 0x1}, {0x6d1, 0x4, 0xf97, 0x7, 0xfff, 0x6}, {0x8, 0x8, 0xffffffa0, 0x1f, 0x5, 0x2}, {0x5, 0x2e, 0x0, 0x4, 0x5, 0x7fffffff}, {0x7e1, 0x6, 0x1, 0x5, 0x6, 0xd8a}, {0xffffffff, 0x7, 0x1, 0x1f, 0x6, 0x100}, {0xebf, 0x80, 0x800, 0x1000, 0xcd, 0x1}, {0x6, 0x43, 0x15c3, 0x6, 0x36b, 0x20}, {0x10000, 0x1bf5, 0x200, 0x800, 0x46f, 0xc45c}, {0x7, 0x4, 0x7, 0x9, 0xffffffff, 0x1ff}, {0xa3, 0x3f, 0x8, 0x101, 0x0, 0x8}, {0x6f756596, 0x200, 0x1, 0x5, 0x800, 0xc76}, {0x1, 0x36, 0xffff, 0x5, 0x2b, 0x8}, {0x7, 0xfffffffd, 0x5, 0x5000000, 0x400, 0xa0000000}, {0x1c00, 0x8000, 0x0, 0x7fffffff, 0x6, 0x6}, {0x1, 0x1000, 0xffffff48, 0x8, 0xc2f1, 0x7fffffff}, {0x6, 0x8, 0x8, 0x3, 0x803c, 0x5}, {0x6, 0x3ff, 0x6, 0x0, 0x5, 0x9}, {0x4, 0x16a, 0x3f7, 0x3, 0x800, 0x6}, {0x5, 0x9, 0x3, 0xe4, 0x2, 0x3}, {0x5, 0x70, 0x7, 0x610, 0x7, 0x9}, {0x0, 0x1f, 0x6, 0x19, 0x4, 0x79d4}, {0x1000, 0xffffffff, 0x0, 0x1, 0xa3f, 0x80000001}, {0x9, 0x2, 0x3f7b, 0x3ff, 0x400, 0x8000}, {0x4, 0x3f, 0xff, 0x0, 0x4037, 0x4728}, {0x7, 0x6, 0x8, 0x2, 0x5, 0xba}, {0x7, 0x6, 0x10000, 0x2, 0x3, 0x10000}, {0x6, 0x1c, 0x1f, 0x1f, 0x7, 0x6}, {0x40, 0x8, 0x1e20, 0x6, 0x6, 0x1f}, {0xbd, 0x7fff, 0x1, 0x5, 0x1000, 0x8}, {0x2, 0xffffffff, 0x401, 0x7f, 0xffffffff, 0x5}, {0x91a5, 0xffffffff, 0x1, 0x2acf0fa2, 0x1}, {0x1c, 0x6, 0x7fff, 0x5, 0x80a, 0x7}, {0xfffffff8, 0x9, 0x9, 0xffffff7f, 0x0, 0x7f}, {0x9, 0x4, 0x4, 0x1, 0x8}, {0x260, 0x7, 0xd5, 0x6, 0x10000}, {0x77b, 0x110c, 0x5, 0x80000000, 0x7, 0x7fffffff}, {0x7f, 0x9d, 0x20d0, 0x100, 0x7}, {0x900000, 0x6, 0x200, 0x80000001, 0x8, 0x2}, {0x0, 0x5, 0x7, 0x1, 0x7, 0x1}, {0x1, 0xffff8001, 0x2, 0x8, 0xffff, 0x7}, {0x2, 0x5, 0x40, 0xffffffff, 0x10001, 0xfffffffd}, {0x80000000, 0x8001, 0xffffffff, 0x9, 0x1, 0x5}, {0x167, 0xfd87, 0x9, 0x4, 0x1, 0x40}, {0x10001, 0x4, 0x100, 0x800, 0x3, 0x6609}, {0x20, 0x5, 0xfffffff9, 0x175, 0x2, 0xc47e}, {0x5, 0x1, 0x9, 0x10001, 0xfd1, 0x100}, {0x5, 0x2, 0x8, 0xfff, 0x1, 0x9}, {0x1, 0x1, 0x800, 0x200, 0x6761, 0x100}, {0xd8, 0x200, 0x2, 0x0, 0x7f, 0x1}, {0x4, 0x1, 0x8001, 0x7fff, 0xffffffff, 0x7}, {0x101, 0x9, 0x1f, 0x21, 0x101, 0x8}, {0x7, 0x7fff, 0xef13, 0x1, 0x3ff}, {0x3, 0x5, 0x5, 0x84c0, 0x10001, 0x514c28db}, {0x6, 0x3f, 0x1, 0x4, 0x5, 0x6}, {0x9, 0x401, 0x7, 0xfffffff9, 0x4, 0x5}, {0x3, 0x8, 0x0, 0x2, 0x5}, {0x6, 0x9, 0x2, 0x1, 0x8, 0x5}, {0x7, 0x2, 0x1, 0x2, 0xfffffff7, 0x4}, {0x1, 0x6d9, 0x3, 0x81, 0x7, 0xfffffbff}, {0x91, 0x8d800000, 0x4, 0x5, 0x401, 0x9}, {0x5, 0x1, 0x8, 0x4, 0xc4, 0x1}, {0x1ab26026, 0x0, 0x3, 0x757a, 0x7f, 0x5}, {0x3ff, 0x3, 0x0, 0xffff0000, 0x7, 0x3}, {0x6, 0x40, 0xfc, 0x7, 0x7fffffff, 0x7f2}, {0x1, 0x1, 0x401, 0x200, 0x7, 0x6}, {0xb4, 0x0, 0x1, 0x1, 0x5, 0x6}, {0x8, 0x9, 0xef7, 0x101, 0x1, 0x1f}, {0x509547dd, 0xb28, 0x2, 0x0, 0x5, 0x4}, {0x8000, 0x400, 0x24, 0x7f, 0x8, 0x10001}, {0x2, 0x2c, 0xfff, 0xfff, 0xff, 0x20}, {0x8, 0x8001, 0xfffffffa, 0xaf, 0xa0ab, 0x8001}, {0x8, 0x7fffffff, 0x8, 0x5b828294, 0xfffffffe, 0xb24e}, {0xff, 0x6, 0x100, 0x1000, 0x1, 0x4}, {0x8, 0x7, 0x2, 0x7ff, 0xd6c}, {0xfffffffc, 0x6, 0x3, 0x4, 0xff, 0xfff}, {0x2f6, 0xfff, 0xe4d, 0x7, 0x8000}, {0x3, 0x5, 0xc43c, 0x5, 0xfff, 0x41}, {0x8, 0xff, 0x4, 0x2, 0x8, 0x15}, {0x0, 0x5, 0x6f, 0x3, 0x4, 0x9}, {0x7f, 0x80, 0x8, 0x1, 0x400, 0x2}, {0x5, 0x1cb, 0xffffffff, 0x7, 0x2, 0xffffffff}, {0xa74, 0x100, 0xffffffff, 0x3858000, 0x10000, 0x8}, {0xa0000000, 0x8001, 0x9, 0xa91, 0x1, 0x2}, {0x9, 0x4, 0x1f, 0x1, 0x8000, 0x200}, {0x6, 0x67, 0x0, 0x7, 0x7, 0x1}, {0x4, 0xfffffffb, 0x1, 0x0, 0x7, 0x8944}, {0xfffffffb, 0x7fffffff, 0x7fffffff, 0x2, 0x3f, 0xfff}, {0x6, 0x8001, 0x2, 0x8, 0x6, 0x6}, {0xf5f, 0x2, 0x4, 0x7, 0x377c, 0x1}, {0x2, 0x5, 0xffffb81c, 0x6, 0x400, 0x1000}, {0x7f, 0x200, 0x1, 0x6, 0x0, 0x7}, {0x3d2e, 0x80, 0x100, 0x4, 0x1, 0x8000}, {0x8180, 0x1ff, 0x401, 0xe4, 0x8}], [{0x4}, {0x3, 0x1}, {0x2}, {0x0, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x2}, {0x3, 0x1}, {0x4}, {0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0xbee6bb3171d9e7c9, 0x1}, {0x4, 0x1}, {0x5}, {0x2}, {0x5, 0x1}, {}, {0x1, 0x1}, {0x5}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x1}, {0x2}, {0x4}, {0x2}, {0x1, 0x1}, {0x2}, {0x1}, {0x2, 0x1}, {0x5}, {}, {0x3, 0x1}, {0x4}, {0x5, 0x1}, {0x5, 0x63785cc013e369ac}, {}, {0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x3}, {0x3}, {}, {0x3}, {0x3, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x4}, {0x5}, {0x5}, {0x5, 0x1}, {0x1, 0x1}, {0x4}, {0x4, 0x1}, {0x2, 0x1}, {0x4}, {0x1, 0x1}, {0x49aac53e6bc7a4d0, 0x1}, {0x6, 0x1}, {0x3, 0x1}, {0x4}, {0x5, 0x1}, {0x4, 0x1}, {0x1}, {0x2, 0x1}, {0x5, 0x2}, {0x5, 0x1}, {0x1}, {0x4}, {0x3, 0x1}, {0x5}, {0x1, 0x1}, {0x3}, {0x3, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x0, 0x1}, {0x5}, {0x4, 0x1}, {0x4, 0x1}, {0x4}, {0x0, 0x1}, {}, {}, {0x1}, {0xee677db06bca233a, 0x1}, {0x4}, {0x1, 0x1}, {0x2}, {0x4, 0x1}, {0x0, 0x1}, {0x2}, {0x2, 0x1}, {0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x3}, {0x4}, {0x5}, {0x0, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x4}, {0x2, 0x1}, {0x3, 0x1}, {0x5}, {}, {0x3}, {0x9, 0x1}, {0x4}, {0x0, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {}, {0x3, 0x1}, {0x6, 0x1}], 0x1}}, @TCA_PEDIT_PARMS_EX={0xe38, 0x4, {{{0x31aba201, 0xa17, 0x0, 0x6808, 0x5}, 0x3, 0x5, [{0x43139015, 0x1e0077cb, 0x9, 0x7, 0x0, 0x7}]}, [{0x29b, 0x4, 0x80000000, 0x5, 0x4, 0x8001}, {0x89, 0x8, 0x6, 0x1, 0x3, 0x5}, {0x4, 0x7, 0xb964, 0x3b0c, 0x9}, {0x10001, 0x1fe, 0x4, 0xfff, 0x0, 0x8}, {0x0, 0x0, 0x3ff, 0x81, 0x1, 0x5}, {0x20, 0xdde4, 0x401, 0x1000, 0x10000, 0x6}, {0x6, 0x8, 0xd245, 0xc11, 0xffffffff, 0xffffff78}, {0x400, 0x3, 0x46, 0x0, 0xbe7d, 0x2}, {0xffff, 0x10001, 0x6, 0x8000, 0x13, 0x1}, {0xff, 0x0, 0x3, 0x8, 0x8, 0x924}, {0x40, 0x7, 0x800, 0x1, 0x1, 0x7}, {0x68, 0xafd, 0x80000000, 0x1f, 0x9, 0x8}, {0xfffffffc, 0x8001, 0x53, 0xbc, 0x1}, {0xff, 0x1, 0x5, 0x100, 0x9, 0x80}, {0x1, 0xa2fe, 0x4, 0x1000, 0x5, 0x4}, {0x6, 0x9, 0x80000000, 0x3, 0xffff2d34, 0xfffffffe}, {0x1, 0x4, 0x81, 0x400, 0x26f, 0x1}, {0x9, 0x6, 0x20, 0x6, 0x800, 0xdf}, {0x1, 0x8001, 0x5, 0x7, 0xfffffffc, 0x5}, {0x8, 0x6, 0xfffff001, 0xffffffff, 0xc780, 0x40}, {0x8, 0x80000001, 0x20, 0x5, 0x40008, 0x800}, {0x1ff, 0xffff, 0x6, 0x4, 0x26ea, 0x2}, {0xfffffff8, 0x8, 0xbb4a, 0xff, 0x10000, 0x2}, {0x8dd2, 0x72f2, 0x81, 0x5, 0x17}, {0xfffffff7, 0x5, 0xe66, 0x3, 0x1, 0x2}, {0x2, 0x2, 0xa8f, 0x5, 0xfffffffe, 0x3}, {0xe5d6, 0x3f, 0x6, 0x1, 0x51cc}, {0x3f, 0x55, 0x6, 0x1, 0x8, 0x7}, {0x7fff, 0x3, 0x0, 0x4, 0x100, 0xffff795d}, {0x7, 0x9, 0x7, 0x4, 0x1, 0x3}, {0x200, 0x0, 0x2, 0x3, 0x80, 0x389}, {0x3, 0x7, 0x2, 0x3, 0x6623fc9c, 0x5}, {0xffffff80, 0x40, 0x3, 0x9, 0x5, 0x40}, {0xfffffff9, 0x20, 0x11c, 0x80000000, 0x6c, 0x7}, {0x6, 0x2, 0x1000, 0x0, 0x80000001, 0x4}, {0x3f, 0x0, 0x2, 0x8, 0x0, 0x8}, {0xffffffff, 0x10000, 0x5, 0xffffffff, 0x2, 0x400}, {0x1, 0x70, 0x2, 0x5, 0xffff, 0x29e}, {0x7, 0x3, 0x4, 0x9, 0x4, 0xeb}, {0x9, 0x5, 0x155, 0x10000, 0x5, 0x3ff}, {0x7a47, 0x4, 0x7, 0x4, 0xbd67, 0x2}, {0x3f, 0x5, 0x8, 0x6, 0x2, 0x1000}, {0x8, 0x32aaca76, 0x78, 0xffffffff, 0x1, 0x3f}, {0x6, 0x1ff, 0x6, 0x7, 0x1, 0x1}, {0xf8, 0x5000, 0x1f, 0x1, 0x2, 0x3}, {0x4, 0x52b, 0x2, 0x101, 0x40, 0x5}, {0xca0, 0x3, 0x3, 0x200, 0xfff, 0x1}, {0x43, 0x1ff, 0x6, 0x8, 0x5, 0xffffffff}, {0x6, 0x4, 0x0, 0x40, 0x2, 0x3d5}, {0x3, 0x0, 0xffffffff, 0x2, 0x8, 0x8}, {0x3f, 0x4, 0x1, 0x1f, 0xffffffb2, 0x5}, {0x0, 0x6, 0xabcc, 0x1000, 0x65f8}, {0x0, 0xb75a, 0x1, 0x7f, 0x81, 0x26b}, {0x9, 0x6e8, 0x2, 0x3, 0x0, 0x5}, {0x600000, 0x9, 0x3, 0x0, 0x5, 0xbd7}, {0x81, 0x80, 0x7ff, 0x80000001, 0xc03, 0x2}, {0x800, 0x1, 0xa8eb, 0x0, 0x3, 0x101}, {0x1, 0x3f, 0x5, 0x80000001, 0x80000000, 0x1000}, {0x8, 0x4, 0xffffffff, 0x9, 0x4}, {0x2, 0x0, 0x9, 0x8d2, 0x1, 0x7}, {0x7f, 0x0, 0xd, 0x4, 0x80}, {0x1, 0x2, 0x2, 0x4, 0x9, 0x1}, {0x800, 0x7, 0xffffff81, 0x81, 0x6, 0xffffffff}, {0x80000001, 0x5, 0x2, 0x579, 0x1}, {0x1ff, 0x1, 0xbd72, 0x8, 0x7a, 0x7}, {0x2, 0x2a, 0x1aa1429e, 0x401, 0x9e41, 0x9}, {0x1, 0x6, 0xfff, 0xe, 0x3, 0xfffffff8}, {0x8, 0x408000, 0x6, 0x8, 0x10000, 0x1}, {0x2, 0x20000, 0x6, 0x2}, {0x20, 0x8000, 0x0, 0x9e57, 0x1, 0x7}, {0x7, 0xfffffff7, 0x7, 0x100, 0x59, 0xe76d}, {0xff, 0x2, 0x7f, 0x2, 0xfff, 0xfff}, {0xfffffffc, 0xfffffffd, 0x8, 0x100, 0x2, 0x7}, {0x4, 0x1f, 0x7, 0x1, 0x9, 0x6}, {0x9, 0x9, 0x440e, 0x30, 0x80000000}, {0x8, 0x4, 0x5, 0x1f, 0xffffffff, 0x1}, {0x0, 0x6, 0xc0000, 0x404, 0x5, 0xc8f}, {0x27cb81ed, 0x3, 0xffffaa0b, 0x8, 0x1f, 0x80}, {0x100, 0x7ff, 0x3, 0x8, 0x4, 0x2}, {0x1, 0x3, 0x0, 0x88, 0x51, 0x40}, {0x0, 0x0, 0x40ff, 0x7fffffff, 0xffffff81, 0x6}, {0x0, 0x4, 0x1f, 0xffff, 0x9, 0x3}, {0x718d, 0xf86, 0x3, 0x10000, 0x2, 0x7d06}, {0x4, 0x7, 0x6, 0x0, 0x3, 0xffff8000}, {0x6493, 0x9, 0x6, 0x6, 0x7293, 0x1}, {0x81, 0x2, 0x3, 0x80, 0x8001, 0x2}, {0x6, 0xff800000, 0x1, 0x0, 0xc5, 0x8de}, {0x1, 0x7, 0x400, 0x2000000, 0x3, 0x2}, {0x1, 0x0, 0x8, 0x80000000, 0x3, 0x3}, {0x0, 0x3, 0x7, 0x6, 0x80000001, 0xc789}, {0x5, 0x5, 0x10001, 0xffffffce, 0x7, 0x4}, {0x1, 0xffff0000, 0x0, 0xfff, 0x4, 0x80000000}, {0x153b, 0x7b62, 0x5, 0x2, 0x3758699a, 0x3}, {0x7, 0x14, 0x9, 0x401, 0x876, 0x5}, {0x0, 0x8, 0x5, 0x4, 0x9, 0x3}, {0x1, 0x2, 0x98, 0x2, 0x0, 0x82ca}, {0x5, 0x10001, 0xfff, 0x4, 0x5, 0x4a6}, {0x53e4, 0x20, 0x7, 0x7fff, 0xf27, 0xcb5}, {0x0, 0x7f, 0xf9, 0x9, 0x401, 0xffffffff}, {0x8000, 0xfffffffe, 0x7fff, 0x3, 0x2, 0x6}, {0x0, 0x7, 0x8000, 0x0, 0x6, 0x2}, {0x5, 0x5, 0x1000, 0x93f, 0x7ff, 0x6}, {0x3, 0x7fff, 0x800, 0x8, 0x2, 0xfffffffa}, {0x9, 0x1, 0x23, 0x0, 0x4, 0x12000}, {0x4, 0x4, 0x7ec14597, 0x6, 0x6, 0x7}, {0x886, 0x9, 0xbe, 0x401, 0xfffff508, 0x1f}, {0x9, 0x0, 0xfffff800, 0x3, 0x95, 0x8000}, {0x10001, 0x7, 0x2, 0x9, 0xff, 0x25}, {0x2, 0x3f, 0xb1, 0x4, 0xaea, 0x80000001}, {0x87, 0x9, 0x9, 0x1, 0x1, 0x3}, {0x4, 0xffffffff, 0xffff, 0x7, 0x9, 0x2400}, {0x1, 0x0, 0x0, 0x80, 0x79e, 0x1}, {0x1, 0x5d7f, 0x5, 0xff, 0x10000, 0x1ff}, {0x7, 0x4394, 0x3, 0x800, 0x80, 0x10}, {0x2, 0xfffffbff, 0x8, 0x80000000, 0x7fff, 0x3}, {0x8, 0xfd7, 0x9, 0x8, 0x2, 0x7}, {0xfffffff9, 0x81, 0x100, 0xd83, 0x1, 0x4}, {0x3, 0x6, 0xff, 0x2, 0x10000, 0xf87}, {0x75600000, 0x0, 0x71b, 0x1, 0x401, 0x1f}, {0x100, 0x38000000, 0xad, 0x7, 0x7, 0x9}, {0xca, 0x8, 0x2a, 0x1000, 0xff, 0x8}, {0x401, 0x2, 0x946, 0x3, 0x1, 0x31b735a0}, {0x80, 0x8001, 0x7ff, 0x7ff, 0x6, 0xffffffff}, {0x4, 0x9, 0x3db6, 0x97, 0x10000, 0x1000}, {0x0, 0x8, 0x0, 0x2, 0x10001, 0x8}, {0x3ff, 0xd8, 0xffff2509, 0x3ff, 0xffffffff, 0x1}, {0x3f, 0x10001, 0x400, 0x800, 0x717, 0x1f}, {0x6, 0x100, 0x3, 0x0, 0x401, 0xffffff00}], [{0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x3}, {0x1, 0x1}, {}, {0x0, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {}, {0x2}, {0x0, 0x1}, {0x1}, {}, {0x3}, {0x0, 0x1}, {0x3, 0x1}, {0x5}, {0x1}, {0x1, 0x1}, {0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x2}, {0x5}, {0x2, 0x1}, {0x0, 0x1}, {0x1}, {}, {0x2, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x2}, {0x2}, {0x4, 0x1}, {}, {0x4, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {}, {0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x4}, {0x4}, {0x5}, {0x3}, {0x3, 0x1}, {}, {0x2, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x4}, {0x2, 0x1}, {0x4, 0x1}, {0x5}, {0x1, 0x1}, {0x3}, {0x2}, {0x5, 0x1}, {0x2, 0x1}, {0x5}, {0xf505c5fa8d3c770e, 0x1}, {0x4, 0x1}, {0x4}, {0x5}, {0x5, 0x1}, {0x5}, {0x2, 0x1}, {0x1}, {0x5}, {0x2, 0x1}, {0x3}, {0x1, 0x1}, {0x5}, {0x4, 0x1}, {0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x3}, {0x4, 0x2}, {}, {0x0, 0x1}, {0x4, 0x1}, {0x3, 0x89b3be5f85fa4c67}, {0x4, 0x1}, {0x2}, {0x3, 0x1}, {0x5}, {0x5, 0x1}, {0x4}, {}, {0x296ccc94884f7876, 0x1}, {0x1, 0x1}, {0x4}, {0x2, 0x1}, {0x5}, {0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x6}, {0x1, 0x1}, {0x3}, {0x3, 0x1}, {0x1}, {0x1, 0x1}, {}, {0x1}, {0x3}, {0x4, 0x1}, {}, {0x5, 0x1}, {0x3}, {0x5}, {0x5, 0x1}, {0x3, 0x1}, {0x3}, {0x1, 0x1}, {0x3, 0x1}, {0x5, 0x1}], 0x1}}, @TCA_PEDIT_KEYS_EX={0x6c, 0x5, 0x0, 0x1, [{0x54, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}]}, @TCA_PEDIT_PARMS={0xec8, 0x2, {{{0x5, 0xf8000000, 0x8, 0x3ff, 0x2}, 0x4, 0x8e, [{0x1f, 0x20, 0x1, 0x1f, 0x401, 0x52}, {0x8, 0x1, 0x55, 0xd1, 0x7000000, 0x3}, {0x200, 0xab79, 0x1ff, 0x7, 0x7ff, 0x400}, {0xd32, 0x3d23, 0x4, 0x77ff, 0x7, 0x401}, {0x9, 0x2, 0xc, 0x8, 0x2, 0x9}, {0x1000, 0x9, 0x5, 0x7, 0x8, 0x1}, {0x0, 0x0, 0x8, 0x1, 0x80, 0x7}]}, [{0x800, 0x3f, 0x217, 0x0, 0x200, 0xd22d}, {0x0, 0xb3, 0x800, 0x6, 0x3, 0x97a}, {0x4, 0x20, 0x9, 0x2, 0xfffffff9, 0xd9}, {0xfff, 0x80, 0x80000001, 0xff, 0x0, 0x3}, {0x3, 0x3ff, 0x101, 0xd4, 0x3ff, 0x4}, {0x9, 0x7fff, 0x6, 0x4e, 0xfffffffb, 0x4}, {0x2, 0x3ff, 0x3, 0x80000001, 0x5, 0x101}, {0x7, 0xfffff801, 0x9, 0x7, 0x4, 0xffff}, {0x3, 0x7fff, 0x7f, 0xff, 0x5, 0x4}, {0x5, 0x8, 0x25e1, 0x5, 0x5, 0x400}, {0x9, 0x7, 0x6, 0x9, 0x80, 0x8000}, {0x81, 0x5, 0x1, 0x555f, 0x4, 0x81}, {0x7fffffff, 0xfff, 0x2d768121, 0x1, 0x7, 0x5}, {0x5, 0x3f, 0x3, 0x1, 0xb4, 0x7}, {0xffff, 0x8, 0xd2d, 0xc3d, 0x200, 0x4}, {0x0, 0x5, 0x7, 0x6, 0x3, 0x3}, {0x9, 0x0, 0x7ff, 0xffff7fff, 0x5, 0x1}, {0x3, 0x1, 0x7fffffff, 0xa8ec, 0x1, 0x7ff}, {0x0, 0x1, 0x8, 0x200, 0x80000001, 0x6}, {0x1, 0x6e21295d, 0x3, 0x5, 0x80000000, 0x1}, {0x9, 0x1, 0x8, 0xd23, 0xfff, 0x1}, {0x3ff, 0x2, 0xa5, 0x1, 0x20, 0x8000}, {0x0, 0x0, 0x7fffffff, 0x1, 0x81, 0x3}, {0x80000000, 0x4, 0x100, 0x6, 0x10001, 0x7}, {0x8, 0x8, 0x9, 0x3f, 0xff, 0x6}, {0x9, 0x100, 0x5, 0x1, 0x240, 0x7}, {0x7, 0x7, 0x400, 0x9, 0xce1b, 0xffffffff}, {0x200, 0x394349c4, 0x6, 0x14000, 0x6, 0x6}, {0xcb, 0xddd, 0x9, 0x3, 0x8000}, {0x36, 0x3, 0x94, 0xbf02, 0x6}, {0xf1, 0x9f4, 0x9, 0x101, 0xdf19, 0x2}, {0x9, 0x8, 0xcaa, 0x6cc8f9a9, 0x101, 0x3d}, {0x0, 0x100, 0x0, 0x4, 0x3f, 0x1000}, {0x8, 0x101, 0x7fff, 0x7, 0x8, 0x1}, {0x9, 0x1, 0x0, 0x8, 0x8, 0xa0d}, {0x5, 0x7fffffff, 0x5, 0x5, 0x7fff, 0x5}, {0x3ff, 0x1, 0x3, 0x3, 0x100, 0x3ff}, {0x9, 0x5, 0x2, 0x6, 0x200}, {0x1, 0x40, 0x3, 0xffff, 0x2, 0x1000}, {0x0, 0xa7c, 0x6, 0xfffffffb, 0x7ff, 0x5}, {0x0, 0x8000, 0x4, 0x3, 0x1, 0x4}, {0x5, 0x8, 0x3, 0x2, 0x2, 0x1}, {0x6, 0x0, 0x1, 0x2, 0x100, 0x9}, {0x800, 0x1, 0x20000000, 0x4, 0x0, 0xfffffff7}, {0xffffffff, 0x8001, 0x9, 0x9, 0xa5991b2, 0x2}, {0xffffffff, 0xfff, 0x5, 0x6, 0x14f, 0x800}, {0xa9, 0xc2, 0x6dd, 0x7, 0x4, 0xfff}, {0x81, 0x834, 0x5697, 0x1, 0xfffffffb, 0x4}, {0xe025, 0x7, 0x6, 0x81000, 0xffffff44, 0x80}, {0x10000, 0x100, 0x80, 0x8, 0x6, 0x2e5}, {0x81, 0x2, 0x4, 0x4, 0x7f, 0x6}, {0x5, 0x9, 0x800, 0x3ff, 0x1f}, {0x6, 0x2, 0x62c, 0x1000, 0x80000001, 0x4}, {0x9, 0x4, 0x7ff, 0xb4, 0x9, 0x6}, {0x10000, 0x7, 0x3, 0x5, 0x1f, 0x81}, {0xbe, 0x2, 0x6, 0x1, 0x8, 0x401}, {0xfffffff8, 0x3, 0x4, 0x20, 0x200000, 0x9}, {0x3f, 0x1, 0xfffffffe, 0x5, 0x0, 0x10040000}, {0x80, 0xc877, 0x48f0, 0x8, 0xddd5, 0x1}, {0x16eb, 0x0, 0x80000001, 0x0, 0xfff, 0x8000}, {0x5, 0x3ff, 0x6, 0x1fc0, 0x3f, 0x3}, {0x7, 0xfff, 0x4e, 0x7, 0x5, 0x144b}, {0x0, 0x3, 0x6, 0xfffffffc, 0x80, 0x8}, {0x4, 0x7, 0x8000, 0xa7, 0x9, 0xff}, {0x0, 0x80000000, 0xfff, 0x0, 0x2}, {0x7, 0xff, 0x7047, 0x9ce, 0x9, 0xffff}, {0x1ff, 0x800, 0x0, 0x4, 0x2, 0x603a}, {0xf3, 0x137f, 0x3ff, 0x8000, 0x1f}, {0x7, 0x1, 0x5, 0x2, 0x70960986, 0x7fffffff}, {0x967ca42, 0x10000, 0x3, 0xa3aa, 0x3, 0x9c77787}, {0x19ff, 0x0, 0xb83, 0x10000, 0x9, 0x3}, {0x900, 0xfff, 0x7, 0x80, 0x2, 0xbf5}, {0xfffffff7, 0xf0a5, 0x1, 0x4, 0x80000000, 0x5}, {0x16, 0x5, 0x4, 0x4, 0x7fffffff, 0x5}, {0x7, 0x7f, 0x4, 0x8e8e, 0x0, 0xfff}, {0x2, 0x49, 0x5, 0x2, 0x0, 0x400}, {0x2b5c3cee, 0x400, 0x3, 0x3, 0x4, 0x81}, {0x100, 0x0, 0x3, 0x1ff, 0x5, 0x100}, {0x401, 0x1f, 0x20, 0xe0, 0x7, 0xbfa}, {0xffffffe0, 0x2b, 0x6, 0xffff, 0xfffffff7}, {0x8, 0x20, 0x2, 0x9, 0x3a997453, 0x20}, {0x6, 0x10000, 0x88, 0x2, 0x0, 0x1ff}, {0x60000, 0x86, 0x3, 0x8f, 0x0, 0x6}, {0x0, 0xd9c, 0x80000001, 0x5, 0x7}, {0x1, 0x81, 0x7, 0x6, 0x4, 0x4}, {0x8001, 0x7, 0x3, 0x1, 0x200, 0x3}, {0x400, 0xffff8001, 0x0, 0x1, 0x3, 0x101}, {0x4, 0x7, 0xcae0, 0x7f, 0x7, 0x100}, {0xe6b, 0x80, 0x0, 0x7fffffff, 0x7, 0x101}, {0x0, 0x6, 0x4, 0x1, 0x5, 0x6}, {0x8, 0x3, 0x8000, 0x800, 0x4, 0x37c6}, {0xe3cd, 0x6, 0x1268, 0x2, 0x8, 0x4}, {0x1, 0x101, 0x6, 0x9a, 0x5, 0x7}, {0x78c3, 0x86, 0x4, 0x7ff, 0x6, 0x1ff}, {0x5, 0x7f, 0x5, 0x2, 0x401, 0xff}, {0x0, 0x9, 0xc0000, 0x9, 0x0, 0x8}, {0x2, 0x81, 0x2, 0x1, 0x6, 0x18c915d9}, {0x4, 0x0, 0x7, 0x5, 0x101, 0x9}, {0xffff, 0x3, 0x5, 0x9, 0x8, 0x2a36}, {0x8, 0x1000000, 0x2, 0x2, 0xe5c5, 0x40}, {0x4, 0x0, 0x7, 0xc3bc, 0x200, 0x7}, {0x4, 0x6, 0x2, 0x0, 0x1000, 0x1ff}, {0x8000000, 0x4, 0x3, 0x0, 0x20, 0x2}, {0x5, 0xc8b, 0x1, 0x6, 0x7ff, 0xfffffffc}, {0x3, 0x5, 0x4, 0x0, 0x6, 0x9}, {0x8001, 0x29b1b8d4, 0x7, 0x823b, 0x20, 0x6}, {0x75, 0x6, 0x1405, 0x6, 0x55b9, 0x1}, {0xfffffffd, 0x1000, 0x7ff, 0x7, 0x7, 0xbf65}, {0x5, 0x4, 0xf479, 0xd8, 0x4, 0x5}, {0x1, 0x0, 0xff, 0x80000000, 0x7, 0x5}, {0x80, 0x9, 0x11, 0xda, 0x0, 0x5}, {0x7, 0xfffffffa, 0xffff49d4, 0x401, 0x1, 0x3}, {0x438e, 0x2, 0xde, 0x5, 0x0, 0x400}, {0x6, 0x8000, 0x2, 0x56, 0x8, 0x9}, {0x4, 0x101, 0x2, 0xff, 0x3, 0x443e}, {0x8, 0x1, 0x3, 0x7f, 0x4, 0x91f}, {0x2, 0x2, 0x7f, 0x9, 0x81}, {0x2, 0x9, 0x4, 0x400, 0x6, 0x1}, {0x80, 0x81, 0x6, 0x5, 0x9, 0x80000001}, {0xfffffe01, 0x1, 0x6, 0xfffffffe, 0x7f, 0x5}, {0x6, 0x3, 0xd53, 0x2, 0x1, 0x3f}, {0xed, 0xfff, 0x3, 0x6, 0x3, 0x7}, {0x5, 0x7, 0x4, 0x3, 0x9, 0x1000}, {0x40, 0x9d, 0x56a, 0x80000000, 0xad, 0x8}, {0x9, 0x0, 0x0, 0xfca5, 0x8, 0x1}, {0xf0, 0x9, 0x3, 0xfffffff7, 0xd3e, 0x7}, {0x933, 0xc608, 0x4, 0x5, 0x2, 0x9}, {0x80, 0xad, 0x5, 0x9, 0x5, 0xd64a}], [{0x2, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {}, {0x1, 0x1}, {0x3, 0x1}, {}, {0x2}, {0x1, 0x1}, {0x4}, {0x5, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x1, 0x3}, {0x1}, {0x5, 0x1}, {0x5, 0x1}, {}, {0x5, 0x1}, {0x4}, {0x2}, {0x1, 0x1}, {0x4, 0x1}, {0x4}, {0x4, 0x1}, {0x5, 0x1}, {0x1}, {0x4}, {0x5, 0x1}, {0x5}, {0x2}, {0x3}, {0x3}, {0x3, 0x1}, {0x1}, {0x4, 0x1}, {0x3}, {0x7}, {}, {0x4}, {0x2}, {0x1, 0x1}, {0x2}, {}, {0x2, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {}, {0x1}, {0x5}, {0x2}, {}, {0x5}, {0x3}, {0x1, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x4}, {0x5, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {}, {0x1, 0x1}, {0x1}, {0x1}, {0x2}, {0x3}, {0x1, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x1}, {0x4, 0x1}, {}, {0x1}, {0x6}, {0x2, 0x1}, {0x5, 0x1}, {0x4}, {0x1, 0x1}, {0x3}, {0x5, 0x1}, {0x5, 0x3}, {0x4, 0x1}, {0x4}, {0x3}, {0x2}, {0x1, 0x1}, {0x3}, {0x2}, {0x4}, {0x0, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {}, {0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x3}, {0x3}, {0xb, 0x1}, {0x2}, {0x0, 0x1}, {0x3}, {0x5, 0x1}, {}, {0x1, 0x1}, {0x5}, {0x2, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x3}, {0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {}, {0x4}, {0x0, 0x1}, {}, {0x2}, {0x3, 0x1}], 0x1}}]}, {0x15, 0x6, "2ddc0c0214d52b4020f4301926244c9a7f"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3}}}}, @m_mpls={0xb8, 0x20, 0x0, 0x0, {{0x9}, {0x24, 0x2, 0x0, 0x1, [@TCA_MPLS_BOS={0x5}, @TCA_MPLS_TC={0x5, 0x6, 0x2}, @TCA_MPLS_TTL={0x5, 0x7, 0x71}, @TCA_MPLS_PROTO={0x6, 0x4, 0x88a2}]}, {0x6a, 0x6, "7e2991b77d004d73e3e493d69b671f073208f00fa4adf1688297ff6f872efb7e5e5ce4caac992dacc7d60e6dcbe845140bcccf4b23670b81fd327a22d01e7c01d47aeeeca3912938365c69c8bb3e8f8c6b57ff75998c6629ad49ea210f5fcf7fbe721d899a6e"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}]}, {0x10b4, 0x1, [@m_skbmod={0x44, 0x3, 0x0, 0x0, {{0xb}, {0x10, 0x2, 0x0, 0x1, [@TCA_SKBMOD_SMAC={0xa}]}, {0x9, 0x6, "90752f5990"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_gact={0x106c, 0x5, 0x0, 0x0, {{0x9}, {0x40, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x2, 0x775, 0x49413880706f6dd8}}, @TCA_GACT_PARMS={0x18, 0x2, {0x8, 0x20, 0x10000000, 0x30979ac7, 0xffffffa1}}, @TCA_GACT_PARMS={0x18, 0x2, {0x80000001, 0x9, 0x3, 0x9, 0x1000}}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}, {0x2a30, 0x1, [@m_connmark={0x1088, 0xf, 0x0, 0x0, {{0xd}, {0x58, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7ff, 0xffff, 0x7, 0x8001, 0x7f}, 0x7}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xb548, 0x4, 0x5, 0x0, 0x43b}, 0x5}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0x10001, 0x20000000, 0x5, 0x2}, 0x4}}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_csum={0x1d0, 0x1a, 0x0, 0x0, {{0x9}, {0xac, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x3, 0xf7b, 0x3, 0xa5f1, 0x9}, 0x57}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1, 0x4, 0x0, 0x1f, 0x800}, 0x66}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1000, 0xffffff1d, 0x3, 0x400, 0x80000001}, 0x29}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x47, 0x5, 0x3, 0x1ff, 0x3f}, 0x2e}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x2, 0x1, 0x5, 0xffff7fff, 0x3}, 0xf}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1f, 0x21, 0x10000000, 0xfd4, 0xff}, 0x17}}]}, {0xfa, 0x6, "a738489f0cfd36a0e09068a4dbc369a4f2e6075dc27c1e659ca55a1c1df0d0dc55010bf3360b55d757c2fe7ea78a7e870fa921cedbf7824db3238d393dc891f9fec8a16a5e3c6340f1e1006544d4d7809793e649b0f73f905cd9dc1ce92964fee53b2df83ec29c33238a29f3a6fb210634de77111e4c5e556b43e550d2dc48ace03c7cdd69125c7264c38618db0bafab3a91c5703cfcc005bbe87b2339928faf26d70aa20c9df32ad677431e4adf0a80a5a2eb6c19ca538faca7e787d38553f2fa11c7ebf00f7674b333f55fb6b0864b7a4da64f3c6d6f0971c3764b940bf3262e38420e41c9e7f364fd66b411938515d31744a929dc"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_xt={0xe4, 0xc, 0x0, 0x0, {{0x7}, {0x14, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_INDEX={0x8}]}, {0xaa, 0x6, "3a4228e1a92684f71fa2728cf5708d2039df5ab80a1628672b702cdd9ec0b21717edf9adb225457fc0048a5ac760d2492d5230442d3a3d7475cde20ab90544272590dc2e312eb139422e724125013db613983ec83660665ca3093a4c884291448475c463d1408f5775e0274d4457a5be71184a76f84a906f1695e86ba0e783784188f7cea8d67f07727e64c029190ce49e64003389e079f5ba0f36bc1155ba19fb3f0a2407a0"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_ct={0x102c, 0x1a, 0x0, 0x0, {{0x7}, {0x4}, {0x1004, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}, @m_skbmod={0xec, 0xe, 0x0, 0x0, {{0xb}, {0xa0, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x5}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x9}, @TCA_SKBMOD_SMAC={0xa, 0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x44}}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x80000001, 0x4, 0x8, 0x400, 0x3}, 0x7}}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0xffffa6de, 0x0, 0x10000000, 0x5c3, 0x5}, 0xf}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x5}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x2, 0x9, 0x2, 0x0, 0xff}, 0x10}}, @TCA_SKBMOD_DMAC={0xa, 0x3, @multicast}]}, {0x21, 0x6, "004e95c2d17eddb1a004785f3fe15b1e8ddc3b040702e8fc802421eb0e"}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_mirred={0x1e8, 0x1b, 0x0, 0x0, {{0xb}, {0xe4, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x8000, 0x8, 0x0, 0x2, 0xe3}, 0x3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x7fff, 0x9, 0x6}, 0x3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x81, 0x6, 0x2000000f, 0x3, 0x1ff}, 0x1, r8}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x8, 0x1, 0x0, 0x7f, 0x6}, 0x3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x1f, 0x5, 0x10000000, 0x4bdb, 0x2}, 0x1, r9}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x15b, 0x0, 0x3, 0x8, 0x800}, 0x2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x97b, 0x9, 0x4, 0x4, 0x7ff}, 0x3}}]}, {0xdb, 0x6, "6db47fca8020c31f6f9973a2ead41cc6fe2352c41d3163090db4793b533a13212b9c533371c1f9e931f180e3b80fe39a169ebfacb27646cfb8a6093b27c5f4e779641f605c4c5cf29b274b5ac3d17e5ed4c9d717d2ab12588686b3dfd020a8c498a13906c82e1854508f5abe67beea72d794dc9b4a1cbe00d7da1809028c865ec1e963579585162fa0c44d3eb66499c384efc5e1a63cd33bf8c276ec54316c2336181ca0128c4c296ebbf6f419febef0dc5e3382abbd7469fc9d0ffaa92aba5c4bbb809cbb3c526969c9d08127d6647da5497435fb2d58"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_ife={0x118, 0x7, 0x0, 0x0, {{0x8}, {0x78, 0x2, 0x0, 0x1, [@TCA_IFE_DMAC={0xa, 0x3, @local}, @TCA_IFE_DMAC={0xa, 0x3, @broadcast}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x4, 0x2, 0x20000000, 0x93}, 0x1}}, @TCA_IFE_TYPE={0x6, 0x5, 0xc7}, @TCA_IFE_TYPE={0x6, 0x5, 0x4}, @TCA_IFE_TYPE={0x6, 0x5, 0x7}, @TCA_IFE_SMAC={0xa}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x7, 0x9, 0x4, 0xfffffff7, 0x3}}}]}, {0x7c, 0x6, "8ffcae336084422fa1e69a417d41d78a86acee5532adb7c608306dcd8e28b919c246bbb43c33ff8754d98762216a978581f9731fcc47596af5284a6ac9e86c2155d823dfd135f60d550cc954b95293129edcd396ee07fea3362fc85ede93f4d5ad81f93fee22b420160dadeec1c51871996e5caad0229508"}, {0xc}, {0xc, 0x8, {0x6, 0x3}}}}, @m_skbedit={0xa8, 0x12, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0xc6, 0x100, 0x1, 0x4, 0x1}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x401}]}, {0x5a, 0x6, "4f81f0f8866ebd5ddef0def0c052db11da6b82f33742575266d3e1d5bd53e4742a5fa8787ffe5d5b480c91cd762301dc545de01036e8e0c6ad71e33dac12d626657dcac0294f057386173a1211fcd79f27849abba8f1"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3}}}}, @m_gact={0x13c, 0x15, 0x0, 0x0, {{0x9}, {0x40, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x0, 0x391, 0x2}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x739, 0x7}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x4fc, 0x20000000}}, @TCA_GACT_PARMS={0x18, 0x2, {0x3ff, 0x7fff, 0x20000000, 0xf1, 0xb0}}]}, {0xd2, 0x6, "6d222ebbffd1132188db18863637497e66580a684271acab4fce97f41f59eab30475edcba9efa042e7d1b66cdad8210bbbffe630c97633bb3762ef0175c41268b32820b9bdae32644ecd30da27755f428fa3dc5b8899b2dd1950fcd573560f3afc77a45ae8f2965e6246e538e136543e939e0ae4422136b0d9689a5eb911be10af2899bf05e33206abd275a6a1301e4ca56f9c9207c38df0f89294d86cb943e1a6c92c1bb35709f69c08ab76f9926998430747981a87cf1823c602fa6653891f6becc13e0988d10c6c10277031d9"}, {0xc}, {0xc, 0x8, {0x0, 0x4}}}}, @m_ife={0xf4, 0x1f, 0x0, 0x0, {{0x8}, {0x98, 0x2, 0x0, 0x1, [@TCA_IFE_TYPE={0x6, 0x5, 0x4}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x8, 0x8, 0x1, 0x0, 0x3}, 0x1}}, @TCA_IFE_TYPE={0x6, 0x5, 0x200}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x80000001, 0x10000004, 0x6015, 0x7511}, 0x1}}, @TCA_IFE_DMAC={0xa, 0x3, @broadcast}, @TCA_IFE_SMAC={0xa, 0x4, @multicast}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x7ff, 0x2, 0x2, 0x3, 0x1ff}, 0x1}}, @TCA_IFE_SMAC={0xa, 0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}}, @TCA_IFE_METALST={0xc, 0x6, [@IFE_META_PRIO={0x8, 0x3, @val=0x6}]}]}, {0x37, 0x6, "481a819d5e0f33596c564d0ca09f0a2a34c3da998dd824da13dd0ca35ca2edf0d1f8bbe1ef3056b869e62c6bb7cc4099b3b8f9"}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}]}, {0x17c, 0x1, [@m_gact={0x94, 0x1c, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0xbad, 0x8, 0x8, 0xd811, 0x7}}]}, {0x4d, 0x6, "dfc51335e30021280f3162c9f90a8ace8844195ff5e885e6f98725f955287b2429d8976fdaf26982da4961e1da4388695e69a1f4df9d2c39e6b03c73451c4ad73e75db4977909b303a"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_mpls={0xe4, 0x5, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x10001, 0x1, 0x4, 0x7f, 0xd}, 0x1}}]}, {0x99, 0x6, "005b7ffecee44e3efa38523378517c1280244f9f88b7496565c95462cb37bbe28bc1c3f31b8cba7d71a8769551fc2089e0900fd6f3aaedb63379ed80c6b50b5f85a8a2564059bda577b9ad54585c3e2d1fe75baaa26a98f02b229a5536a6942e1e83549508549669e527b1b17daa1c25e7397b18775ce19b40973dc8efdadbd74132551f338282e31d8b83e87bafcef818a3cde7dd"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}]}, 0xca84}, 0x1, 0x0, 0x0, 0x8804}, 0x4000) splice(r4, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:26 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x1}, 0x0, 0x0, 0x20, 0x8, 0x0, 0x40000}, 0x0, 0x2, 0xffffffffffffffff, 0x1) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r3) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x8c, 0x6, 0x5, 0x0, 0x0, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x622e, 0x2, @perf_bp={&(0x7f0000000940), 0x4}, 0x20, 0x0, 0x7, 0x4, 0x0, 0x100, 0x7, 0x0, 0x800}, r4, 0xe, r3, 0x3) ioctl$BTRFS_IOC_BALANCE(r3, 0x5000940c, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0xfffffdba, 0xd3, 0x0, &(0x7f00000003c0)=""/203, 0xffffffff, 0x0, 0xa6, 0x0, &(0x7f0000000600)="ef74d8e79dd5f9132e07baf60e118b9ee9f33407baa896976cecb8e2a538b5eff99dd569466aafc4ff4d8358c2e0db36793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0cac3fa798015c9f2a366171bb0944ac1d727f4d4c6c5dbd281a3b242efbc0b6232a564cc18440f5edb07e54b6f6504793c6f72363a2b499bb94f478697d42a9bac089be3717e34bf0af841", &(0x7f0000000340), 0x0, 0x20004}, 0x48) 04:05:26 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x21, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:26 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x6203]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:26 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x8d01, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:26 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r2 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r2) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x8c, 0x6, 0x5, 0x0, 0x0, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x622e, 0x2, @perf_bp={&(0x7f0000000940), 0x4}, 0x20, 0x0, 0x7, 0x4, 0x0, 0x100, 0x7, 0x0, 0x800}, r3, 0xe, r2, 0x3) splice(r2, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x6) 04:05:26 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x22, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:26 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x3000000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:26 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x6403]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:26 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0xa803, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:26 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x23, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:26 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x4000000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:26 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x7602]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xe1844, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r3) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x8c, 0x6, 0x5, 0x0, 0x0, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x622e, 0x2, @perf_bp={&(0x7f0000000940), 0x4}, 0x20, 0x0, 0x7, 0x4, 0x0, 0x100, 0x7, 0x0, 0x800}, r4, 0xe, r3, 0x3) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000340)='GPL\x00') epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r1, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x5e, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000600)="db91d9defa9bb1c3643ab68cd5d0bdebfde70ef4af12ca7e950032d5b46bd7407626cb6b0e805691bdf9685a979c63f9767f74f33117488c93dd9a354fc7a026e1e6b079982dd7332cc4583c610c5ad0e5c110a3cfc3c9e9364739a554b5", 0x1, 0xbf}, 0x48) 04:05:27 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x5000000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:27 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0xd403, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:27 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x24, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:27 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x8800]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:27 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) syz_open_dev$dri(&(0x7f0000000300), 0x6, 0x2000) splice(r0, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:27 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0xe200, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:27 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x25, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:27 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x6000000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:27 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r3) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x8c, 0x6, 0x5, 0x0, 0x0, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x622e, 0x2, @perf_bp={&(0x7f0000000940), 0x4}, 0x20, 0x0, 0x7, 0x4, 0x0, 0x100, 0x7, 0x0, 0x800}, r4, 0xe, r3, 0x3) sendmsg$nl_route_sched(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=@deltaction={0x78, 0x31, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@TCA_ACT_TAB={0x64, 0x1, [{0x10, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xd5e}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8080}, 0x4004080) splice(r2, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:27 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0xf403, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:27 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x28, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:28 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x80000, 0xc4) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:28 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x7000000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:28 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x29, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:28 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x8802]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:28 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x20000, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:28 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) clone(0xe0321000, &(0x7f0000000300)="2cb07c8d3312636c15ca82efc8c92c175b02bb3cfbd83e56fa0f70c2497e5c7bcab86d353097e63c55f6ba501354caaa76083fd737e33cceea09236afd49322da92fa9e2b039709496e0bd27707f787a5eaf1c801e8d9fdd75651aba6d22e7bbfccb86d324815ff53eaef94553752218b9106964d8fa42194990483ea860718f80d7f91be40e962a1c44e06d92cd56fe5b48e5f394d7f95188ff92437b7cc4aa507875ca2b4e678f260e88e5971f83d213e718c917eed20e4b1bed80", &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="4f60720d73b9a77f4d2c145e18147bedbad873b3b122d8f32ea02db263735d7eb7cb303d696c1a8116b19354dbb2b47de50e11303d2a3e6ef381cae5d5bbc4c7e061760de0d3a3b8a3abe356ca8244dfc687b7dd56793156f061b7ea373bc3df37ce4299b7a96b0eef506ec069a0eca00f286d72473047cfcf1ae7c6433a52a4e85215") syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = inotify_add_watch(r1, &(0x7f0000000500)='./file0\x00', 0xc0000000) inotify_rm_watch(r1, r2) openat$procfs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r3, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:28 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x40000, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:28 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x8000000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:28 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x2a, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:28 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') clone(0x4000000, &(0x7f0000000340)="e5f150282281a77a13e6", &(0x7f0000000380), &(0x7f0000000540), &(0x7f0000000600)="a17673041f16e032728d54d0c4b596") splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:28 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x9003]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:28 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz0\x00', 0x1ff) perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r3) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x8c, 0x6, 0x5, 0x0, 0x0, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x622e, 0x2, @perf_bp={&(0x7f0000000940), 0x4}, 0x20, 0x0, 0x7, 0x4, 0x0, 0x100, 0x7, 0x0, 0x800}, r4, 0xe, r3, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000500)='*%#.:)({*\x00') r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300), 0x400, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r5, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[], 0x40}}, 0x20000000) splice(r2, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:28 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x1000000, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:28 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0xc000000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:29 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x2b, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:29 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x2c, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:29 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x10020000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:29 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0xa102]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:29 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x2000000, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:29 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x2d, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:29 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x2e, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:30 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000380)=0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x1c, 0x7, 0x3, 0x2, 0x0, 0x7, 0x28840, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000340), 0x9}, 0x10, 0xe0a, 0x10001, 0x7, 0x3ff, 0x3, 0xd4, 0x0, 0x7, 0x0, 0x1}, r3, 0x8, r0, 0x2) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:30 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x11000000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:30 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r1) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x8c, 0x6, 0x5, 0x0, 0x0, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x622e, 0x2, @perf_bp={&(0x7f0000000940), 0x4}, 0x20, 0x0, 0x7, 0x4, 0x0, 0x100, 0x7, 0x0, 0x800}, r2, 0xe, r1, 0x3) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x4, 0xff, 0x3, 0x40, 0x0, 0x3dc, 0x80000, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x80, 0xffffffff}, 0x1050, 0x80000000, 0x6, 0x1, 0x9, 0x8, 0x81, 0x0, 0x0, 0x0, 0x3}, r2, 0x1, r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r5, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:30 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x2030000, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:30 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x2f, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:30 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0xa803]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:30 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:30 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x11010000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:30 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:30 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x3000000, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:30 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0xd403]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:30 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x14000000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:30 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x30, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:30 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r2, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:30 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x8c, 0x6, 0x5, 0x0, 0x0, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x622e, 0x2, @perf_bp={&(0x7f0000000940), 0x4}, 0x20, 0x0, 0x7, 0x4, 0x0, 0x100, 0x7, 0x0, 0x800}, r0, 0xe, 0xffffffffffffffff, 0x3) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x10010, 0xffffffffffffffff, 0xb88d000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) name_to_handle_at(r2, &(0x7f0000000340)='./file0\x00', &(0x7f0000000600)=@OVL_FILEID_V0={0xd5, 0xfb, {0x0, 0xfb, 0xd5, 0x2, 0xf6, "69a73a008d9edc173c197a2ec16ad069", "4449a4fc145ba53e0b2d39ade742d844e08937593ab4d7f61270bfa757c5d14aa22a53dc4d08e3b8fd6c9b50fc4db98e0e78d5a341841a79ecda37134bb33b1450ff6a5495f830ea3e137ad88d02a4d5ec5a12aec9c4550988ff8ce69a358d8cab7f0fa95e135917685c8abfb24b16da465e48835fffc012f5126075be26261b0cf21250ca1ce9789a43f69835da5e45b4af7621839e4954e2c4149d60b636852dfc08164061916ef3253fe06c8b63c5ed624f51983c124606b18188f437d1ba"}}, &(0x7f0000000380), 0x1400) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xbc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:30 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0xda01]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:30 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x18030000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:30 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x31, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:31 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x4000000, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:31 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0xe200]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:31 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000880)={0xf6, 0x267, {0xffffffffffffffff}, {}, 0x1, 0x100}) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x9, 0x4, 0xff, 0x81, 0x0, 0x4, 0xa0995, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000007c0), 0x2}, 0x28, 0xfc3b, 0x1b82eb3d, 0x3, 0xfffffffffffffff7, 0x2, 0x8001, 0x0, 0x7, 0x0, 0x6}, r0, 0x5, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000008c0)={'wlan1\x00'}) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) clone(0x800000, &(0x7f0000000300)="1cb2eb9694c58709256883", &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="90930282a862104592072b50e7c643e13cf72a05bc3f683c") syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000440), 0x4800, 0x0) getsockopt$inet6_tcp_buf(r4, 0x6, 0x1a, &(0x7f0000000480)=""/136, &(0x7f0000000540)=0x88) clone(0x0, &(0x7f0000000580)="336c88ea98cb196a2f3749d9e90434dbdaca5f496e30", &(0x7f00000005c0), &(0x7f0000000680), &(0x7f00000006c0)="10f2911131eb051eead0229b4d25604ab6943d3809259b495cb9bcdb8ee888fffb90850b1b4c597d65d3cf77f1b1cb5ab827dbdf7fa96bdbf5b75aaebee19c0736a68075c6a987f00794752d445f2c573d613a1018ec7d1575eb4a3acd538aaa0b4262ba8ff10933e27ebfa5d28727e73040add607cde46f8efb61605e76b7e968f2fb08f706d168a65f1950844356ec7c29231a41737b8c11fb437264897e5013148ea4c03a09f8b39eff6e375d68cdc5f172cfa2a48485ee6d586d45a5a32d61ea471b560972a5d12fa7") sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r5, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:31 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x32, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:31 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x5000000, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:31 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x1d000000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:31 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = fork() perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_INTERFACE(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4040880) splice(r3, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) fcntl$setpipe(r2, 0x407, 0x100000001) 04:05:31 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0xf403]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:31 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000600)={0x74, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000000}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'sh\x00'}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x40014}, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:31 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x41, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:31 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x9, 0x1, 0x3, 0x9, 0x0, 0xfff, 0x80020, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x4, @perf_bp={&(0x7f0000000300), 0x2}, 0x1880, 0x7, 0x9, 0x2, 0xffffffff00000000, 0x80, 0x0, 0x0, 0x8684, 0x0, 0x5}, r1, 0x4, r0, 0x3) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r4, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:31 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x24020000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:31 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x6000000, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:31 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x20000]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:32 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r1) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x8c, 0x6, 0x5, 0x0, 0x0, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x622e, 0x2, @perf_bp={&(0x7f0000000940), 0x4}, 0x20, 0x0, 0x7, 0x4, 0x0, 0x100, 0x7, 0x0, 0x800}, r2, 0xe, r1, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x5, 0x0, 0x4, 0x93, 0x0, 0x6, 0x20004, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000340), 0x2}, 0x10000, 0x3, 0x7, 0x5, 0xe95, 0x6, 0x7, 0x0, 0x500000, 0x0, 0x9}, 0xffffffffffffffff, 0x0, r1, 0x2) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0xdb12) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) pwritev(r0, &(0x7f00000005c0)=[{&(0x7f0000000400)="0eba274c5e7d8841f63e90fa9470e3b7ef2eb4f6674dbb6a3bcba9c49c3d2042e3532e4cb052834a25531c30a88e3afc9c70b4a0cada760ca8df3cc8e1d218aa1c2b2eec9f05a7df04b1ff714777206e4447df27ece3ae24e20795ec26164c02629d1fa30fe2940013dfa3c616ed8bafdd8a91c7c58a71d2856e195957ed941b16a2467afc1048211b2f5df665709106e123a121d7eb4bd3", 0x98}, {&(0x7f00000004c0)="58a8b59b6098f230aecb1d43806e9489974a7386046c4a368012ee2e40dc0cf2e576e0490c30941bad1cafa50633231fd8292693471386169c99307e7be005cef38ef9d98e6aa8a71f5a721aba48c0af8e183476e1b2d417f7a7f7fff4df1adb90c4f2c6268b249973c75a95f6", 0x6d}, {&(0x7f0000000540)="c4d78d02abaf321f9377e6eff3d360621b4a7d0950467b57e706ad295df62c9debf2227a8cd0e6fe89620451a85d4ab0f010d3b4f44be323b697b13e81fd54624e802ba05c6c7eab76ceb9bb73cc0f03b3868f0c6a071c00c7154f220a7f14134a4a31c96d047afcb21935", 0x6b}], 0x3, 0x5, 0x81) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r4, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000300)) 04:05:32 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x30010000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:32 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) read$FUSE(r2, &(0x7f0000001840)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x81, 0x20, 0x9, 0x5, 0x0, 0x7ff, 0x80081, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000340), 0x1}, 0x801, 0x9, 0x5, 0x4, 0x5, 0x7, 0x6346, 0x0, 0x80000000, 0x0, 0x2}, r4, 0x7, r0, 0x8) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:32 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x42, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:32 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x30020000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:32 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x40000]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:32 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x7000000, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:32 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCPNADDRESOURCE(r1, 0x89e0, &(0x7f0000000300)=0x9) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r2, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:32 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x50854, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x3, &(0x7f00000003c0)=0x9) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4044000, &(0x7f0000000380)="4fa9197172f0f7ee52cc4e98ab1a4d001c655d97599111210e2694a5c5846fcbef66a6fac45dc86d99d9f290aa2dcd1d41", &(0x7f0000000540), &(0x7f0000000600), &(0x7f0000000640)="268b3ae793a66a6b1e766218b104981e989b71a204f3f3442d15d37de7e084334aeb865a519418a75cdc03faed89e08f91e91393eaf1") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x8c, 0x6, 0x5, 0x0, 0x0, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x622e, 0x2, @perf_bp={&(0x7f0000000940), 0x4}, 0x20, 0x0, 0x7, 0x4, 0x0, 0x100, 0x7, 0x0, 0x800}, r3, 0xe, 0xffffffffffffffff, 0x3) ioctl$vim2m_VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000680)={0x6, 0x2, 0x1, "026cbbbae6d760758a02e809b0a79f7d54617f35dcbde252bc24d9c8a6d0c96e", 0x50424752}) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340), 0x4) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) 04:05:32 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x34030000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:32 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x1000000]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:32 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r2, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:32 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x8000000, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:32 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x60, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) 04:05:33 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {0x4a000000}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x210, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) clone(0x0, &(0x7f0000000600)="ad3c36a28d6493bbdbd9945191faa8da28d542c83b9f51a8b534add9642bf0ec30bdb133af214d0bb507a51f3d1a17245e7be4b0a52a3bbac42c9d5f5e45ee0829f745afa3f0635753ba2e35d5d0a4cbfbfdf97e69eadeab60aa2b4c709bdf7ae9f9ae6e51077e287d02245e31d89eb80e21e30a6aab0dbad41a56566bfa31c9e434dc1fa4328d56870d2134aab3f7a70bcedd9c3996c2f37459bfc9c553ff8695de6d5d53898ae5f2ad8a3588d67f35664a23abaac1b7bbc3", &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000006c0)="dd9a5eddcae8510a3da6ddefe0d3ee30ddc7fdce476a7bbd565892605c1520d021e6a98633d2029123b2bc4a435f37699ef73a83cbef42be73668ec7344b89c0e4f6517c69bb7f06ddd49baa74b6ccbeb8294d4fb94d35221d6ece89efaa93ce53cdcb34") r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:33 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8481, 0xab) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x25}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) splice(r2, &(0x7f0000000600), 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) 04:05:33 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}, {[0x0, 0x2000000]}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x5c, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964a0ca", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:33 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x2a8, 0x130, 0x5002004a, 0x40000, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0xc000000, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000f40)='\x00\x00#\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\xd8(\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf3\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\xfa\xc2\xbc\xa1\x9ft\xc1r\xed\x93\x9b@>\xe7!\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfcb>\x86\xbb\xd8\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xabam\xe3\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A\xc4b \xbd\xa4 @\x010\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc24\x93\xf4\xe6\x12|-\xfe\xe8\b\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xfa\xb9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8\x05\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJT\t4\xe3\x91[\x85G\xb1\xee@\xae\xc2A;\x06!RW\xc26\x06E\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xb7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\x01\x00\x00\x00\x00\xbaQ\xacj\x81\xc8\xf8\x146%Z\x83H\xabF=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1dx\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(\xf0\xb4;\x0e\x18\xf7/A\xfd\x92\xd0\x90ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W%O\xedz]+\x0e=\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc6.\xfa\xbd\xf6\xce\x03\xfa`\x8e\xb8\x9a\x16\xbf\xf0m\xaao\xef\xf7\x9c\x9c\xb3\x92\xb9 \xd5\xe5\x1c]\x14zs\xd4\x97\xf8\xc0\xfa\x13\xfc\x00\xe0\x93\x0e\xfa\xcc\xb6`R[\x9f\x9e\xf1p\x86wvEG\xac\xbf\x8ai\x92\xbfD\x16\xd3Y\xe0\xa43\x91\xae\x98\n\xa0\xea\xa1\x98]\xb2\x8b\xcaD\x1d`n\xa2\xc5\x02\xf3K\x16S\xd4\x1d\x87\xa5kq\xfc\xa1\xa2$\xf7F\xb8\xb2s\x8a{\x8a\x89dN\xfc\x80\x0e\x88\xbb\x06\xcd\x8a\"\xff\xc8\x823\xaf\xc6\x98\xf9X\xd7~\xddV\xb8\xe2}\v\xfe\xcbT\xa9x\x89\xa8\xbd\xfa\xd0Ym\xee(}\xb5\"\xe6\xd2=\xcd-D=\x1cx,\xbc\xfc\xc2Q\x02.X\x92\x90\xf8\xca\xc4\x99\x9e_\xb28qi\xf0p\xab>\x06\xf0~\rY\xb5\xaa\x1fK\xd9\xe3k\x16G\x8f\x8b\x85\n: N\xce\b\xa1\x86\x1d\xd7$\x88i\x97\x1d=?\x1e\xc2\xca\x16gR\xe6C\xfaB\x01\xb5>\x9b\x93 /\xea \x8c\xc5\x01/\xed\xce\x8d\xba\xf1\x85\xd69\xb2\xf6\xee\x9e\xbe\xabb\xa8\x81\xf5^r\x8b5j6\x80y\xa16\xba\x14v~\xd3\xdc\xa0\xff\xff\xff\x7f\xf3\xd6\x8c\xa5]\xb1\x0f\aJ\xe6}\x9f}6\x91`\"\'\xf8?\x06k\xab\xd1\x17O=K\xc3\xcd\xcb$v\xad\xb6\xb2\x9d)\xf0\xad\x19\x03m\xc8\xcbhl\x9dN\xd7\x895\n\xb4l\xa5\xda\xc8\xd1w\xf1\xb2\xd5B\xff\xe7%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\xfax\xc05L\xfd\xae\x9f\xd1[A\xe3\x1f,\xfa\xa1\x95\x10\xd8\x921P\xd6X\x11\xae\x03\x10\x1f\xd6!\xa40\xa0pn\xf8\xd9\xc6\xbe\xc3-\x04\xaa\x18\xc5\xa6q\x94\xc8\xc0\xadAG\xa92\xef\x18\xaeD\xcbh\xfe\xdbm\n\xdf\x97\xd0\xc5\xe0\x02t\xad\r\xcd\x8f\x8bj\'\xecs\xc9\xbd\x9aJA\xfe\x88\xa8S\xf9\x88\xc2\xd11mp\xdb\x81\xb3y\xe4\xadD\x04W+\x8e6&\x87\xf3\xf0=\xb3\x94\x82k\x98\x14\xfe\xb3\x8d\xf2?\xd3\x03\xee\xfb\x80\xf3ZLG\x9do\xd3\xa2ETK\x17I\x14\x05\x83x\xb5`\x8f\xc6\xfbe') splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5a, 0x0, &(0x7f00000004c0)="ef74d8e79dd5f9132e07baf60e118b83e9f33407baa8969e6cecb8e2a538b5dcf99dd569466aafc4ff4d8358c2e0d436793f1b60e2c28d634dd62022f2291305fa3c60adac9ab705678d6514dd84237ebaa2e71a8abceada9964", &(0x7f0000000540), 0x0, 0xbf}, 0x48) 04:05:33 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x78, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0x130, 0x5002004a, 0x0, 0x0, 0x0, 0x210, 0x3c8, 0x3c8, 0x210, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00', {}, {}, 0x6}, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}, @common=@unspec=@devgroup={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'veth1_to_bond\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x8084000) bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0xc5, 0x0, &(0x7f00000003c0)=""/197, 0xffffffff, 0x0, 0x1, 0x35, &(0x7f00000004c0)="ef", &(0x7f0000000540)="7b6fe52c510e7282fb7b7ea041bda3b6b298b3f9707b4a7987efd44739d3bbd3f2de1443b21c5229ce979c4839704145d1489002f5"}, 0x48) [ 2487.064626][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 2487.071003][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 [ 2586.344858][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 2586.351188][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 [ 2614.256780][ T27] INFO: task syz-executor.3:13666 blocked for more than 159 seconds. [ 2614.270456][ T27] Not tainted 5.15.0-syzkaller #0 [ 2614.276102][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2614.284819][ T27] task:syz-executor.3 state:D stack:28288 pid:13666 ppid: 6815 flags:0x00004006 [ 2614.294119][ T27] Call Trace: [ 2614.297412][ T27] [ 2614.300364][ T27] __schedule+0xa9a/0x4940 [ 2614.304868][ T27] ? io_schedule_timeout+0x180/0x180 [ 2614.310174][ T27] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 2614.316043][ T27] ? lockdep_hardirqs_on+0x79/0x100 [ 2614.321280][ T27] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 2614.327145][ T27] schedule+0xd2/0x260 [ 2614.331233][ T27] synchronize_rcu_expedited+0x5a8/0x620 [ 2614.336916][ T27] ? rcu_exp_wait_wake+0xe50/0xe50 [ 2614.342073][ T27] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2614.348073][ T27] ? finish_wait+0x270/0x270 [ 2614.352719][ T27] ? perf_trace_lock+0xeb/0x4d0 [ 2614.357595][ T27] ? check_path.constprop.0+0x50/0x50 [ 2614.363040][ T27] ? find_held_lock+0x2d/0x110 [ 2614.367829][ T27] ? packet_release+0xa25/0xcc0 [ 2614.372882][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 2614.377759][ T27] synchronize_rcu+0x132/0x190 [ 2614.382579][ T27] ? synchronize_rcu_expedited+0x620/0x620 [ 2614.388406][ T27] ? __mutex_unlock_slowpath+0x157/0x5e0 [ 2614.394201][ T27] ? wait_for_completion_io+0x270/0x270 [ 2614.399787][ T27] ? mutex_is_locked+0xe/0x40 [ 2614.404524][ T27] synchronize_net+0x4a/0x50 [ 2614.409210][ T27] packet_release+0xa2a/0xcc0 [ 2614.413941][ T27] ? packet_recvmsg+0x1150/0x1150 [ 2614.418980][ T27] ? down_write+0xde/0x150 [ 2614.423474][ T27] ? __down_timeout+0x10/0x10 [ 2614.428174][ T27] ? locks_remove_file+0x2f7/0x570 [ 2614.433412][ T27] ? fcntl_setlk+0xd00/0xd00 [ 2614.438027][ T27] __sock_release+0xcd/0x280 [ 2614.442671][ T27] sock_close+0x18/0x20 [ 2614.446843][ T27] __fput+0x286/0x9f0 [ 2614.450838][ T27] ? __sock_release+0x280/0x280 [ 2614.455753][ T27] task_work_run+0xdd/0x1a0 [ 2614.460281][ T27] do_exit+0xc14/0x2b40 [ 2614.464497][ T27] ? mm_update_next_owner+0x7a0/0x7a0 [ 2614.469887][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 2614.474794][ T27] do_group_exit+0x125/0x310 [ 2614.479491][ T27] get_signal+0x47d/0x21d0 [ 2614.484037][ T27] arch_do_signal_or_restart+0x2a9/0x1c40 [ 2614.489814][ T27] ? do_futex+0x10c/0x390 [ 2614.494187][ T27] ? __ia32_sys_get_robust_list+0x420/0x420 [ 2614.500093][ T27] ? find_held_lock+0x2d/0x110 [ 2614.504938][ T27] ? get_sigframe_size+0x10/0x10 [ 2614.509902][ T27] ? __x64_sys_futex+0x1b0/0x4a0 [ 2614.514884][ T27] ? do_futex+0x390/0x390 [ 2614.519247][ T27] exit_to_user_mode_prepare+0x17d/0x290 [ 2614.525013][ T27] syscall_exit_to_user_mode+0x19/0x60 [ 2614.530489][ T27] do_syscall_64+0x42/0xb0 [ 2614.534965][ T27] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2614.540879][ T27] RIP: 0033:0x7f24f1948ae9 [ 2614.545333][ T27] RSP: 002b:00007f24eee9d218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 2614.553792][ T27] RAX: fffffffffffffe00 RBX: 00007f24f1a5c028 RCX: 00007f24f1948ae9 [ 2614.561801][ T27] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f24f1a5c028 [ 2614.569868][ T27] RBP: 00007f24f1a5c020 R08: 0000000000000000 R09: 0000000000000000 [ 2614.577876][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24f1a5c02c [ 2614.585890][ T27] R13: 00007f24f1f8fb2f R14: 00007f24eee9d300 R15: 0000000000022000 [ 2614.593919][ T27]