uting program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyprintk\x00', 0x200, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000180)=0x2) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0xba) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, &(0x7f0000000100)=[{{0x4}, {0x4}}, {{0x4, 0x0, 0x0, 0x1}, {0x1, 0x1}}, {{0x3, 0x1, 0x1}, {0x3, 0x0, 0x1, 0x1}}, {{0x2, 0x1, 0x1, 0x1}, {0x1, 0x1, 0x1, 0x1}}], 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="7d9202876ad2ded95e2e609756b0974dc7264d1e12a9143cfdce1e5433376f42f8f1c9fad1d6195c6ae0a1e2236aae6002e99ede7238f07e18a8e8c96a3ac6050f1cfe4e39f70a7c3504986b8a1f7b1689f30270d9abaf318b98043117bf3cb2ce09e985eb4a5e20c14490e557546269aad9ef9d2bcbf5fda9e6b65a17e5092d2693d2cbab9d4c51d2c45d05aa56f9b83cf2c5394b6112c29890a79e65f48326266659827a1e05ec207d835536392bd643fc6f88ea94a43c0e7779ceec2b6715ef27251f4b92043c1ae67a150a4eaa86519237615f52125800496b6f2771426087572e17ff", 0xe5}, {&(0x7f00000002c0)="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", 0x1000}], 0x2}, 0x0) 01:58:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe21, 0x0, @local, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) syz_genetlink_get_family_id$l2tp(0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 699.053991][T23469] cgroup: Unknown subsys name ''ppp0{w\an0procvboxnet1&vmnet0' [ 699.084151][T23471] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 699.085079][T23472] cgroup: Unknown subsys name ''ppp0{w\an0procvboxnet1&vmnet0' 01:58:50 executing program 4: setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0xa3, 0x4, 0x7, "fcf7bf194dcf7abf71fb6d7243eac060", "9f00d9354ffafe3767de6efba99dd04ee12bdf32bf5b18697538d1890f70ad885da11d242f3563c903d60afa90ccbca4be74af53213d53712f85b26567cccab8a0c39ea2363c373aba1fa054aaac8d38e32a1df49590a9c8ac1f18c109aa0e89940b6bbf07d70052f839fe23ca9b65a04a6a91e36b25943bbac3bb64621c50e81cc4ae2581f7f431d92daf22c48c"}, 0xa3, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000200)={@local, @dev, @val={@val={0x9100, 0x4, 0x1, 0x1}, {0x8100, 0x7, 0x0, 0x1}}, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x8, 0x2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000180)=0x78, 0x4) 01:58:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000280)="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", 0x200}]) r2 = dup(0xffffffffffffffff) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f0000000040)=0x1, 0x4) 01:58:51 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wuan0procvboxnet1&vmnet0\x00') 01:58:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x14000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:58:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe21, 0x0, @local, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) syz_genetlink_get_family_id$l2tp(0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 699.412068][T23489] cgroup: Unknown subsys name ''ppp0{wuan0procvboxnet1&vmnet0' [ 699.444603][T23493] cgroup: Unknown subsys name ''ppp0{wuan0procvboxnet1&vmnet0' 01:58:51 executing program 2: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000003, 0x10012, 0xffffffffffffffff, 0x9aee1000) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) 01:58:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e20, 0x1f, @empty}}, [0x0, 0x0, 0x1, 0x0, 0x7f, 0xfffffffffffffff9, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xe7, 0x1]}, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood\x00', 0x9) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40080, 0x0) [ 699.469348][T23495] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:58:51 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wl\nn0procvboxnet1&vmnet0\x00') [ 699.577821][T23499] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:58:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x15000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:58:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000100)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="037c57560740701f12060ee2ce3de297172cbc32b3ca615bee0fc7278917b745689644b43b6cf48b741cd251873308bf7e2a3a1f006cdca8e8ad80f09f0af7ffffdf190c7679b4593c926ee2d47c56af41ad6efe15e902109a91152b64fa8aa6491dab03b95eb4562680f8ee224ca10efd407116657ff19aa0778237db761d619bea6b7c0d31a8029f60785b39ccc0d3aa8ea18bb5db1f9e56e361affda62c758aeaa6ee4005f49b8c04295d93cc918d282d64f2105cdbeba2e4ff8bfef561d6"], 0x18}}, 0x0) 01:58:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe21, 0x0, @local, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) syz_genetlink_get_family_id$l2tp(0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 699.821958][T23511] cgroup: Unknown subsys name ''ppp0{wl [ 699.821958][T23511] n0procvboxnet1&vmnet0' [ 699.864397][T23514] cgroup: Unknown subsys name ''ppp0{wl [ 699.864397][T23514] n0procvboxnet1&vmnet0' 01:58:51 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) ioctl$SNDRV_PCM_IOCTL_DROP(r3, 0x4143, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x8) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r4) r5 = socket(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="128ea7f72a1de02ba04ca9dbfc03763afe8d0a6dce9ffd82f903f336552edf3b4db80793cf81116518223124ac056a7de453301b91138287eb676949aeb71e1120ca3cdd29098ef2e58d5c1c1f6454ab310c66427f8cff7ecec17006730ee1acef145a2a60d93a779f5ccc451714f8e920ccf590bf5a4512d324250959a39b92c50fccdedb5c1b6c6e56b1da20cadb1f58dea91be3", @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000007000100667100000c0002000800060000000000"], 0x38}}, 0x0) [ 699.934355][T23519] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:58:51 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wl%n0procvboxnet1&vmnet0\x00') [ 700.041072][T23524] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:58:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe21, 0x0, @local, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) syz_genetlink_get_family_id$l2tp(0x0) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:58:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=0x0], 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x6000, r5}}, 0x20}, 0x1, 0xc00000000000000}, 0x0) r6 = open(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r6, 0x80045500, &(0x7f00000000c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0xfffffeff000) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r7) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r8, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x38, r9, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5, 0x2}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x38}}, 0x0) sendmsg$TIPC_NL_NET_GET(r7, &(0x7f00000005c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="78f2d30e9bfc504d539da98bd3facaf213ad71dd9478643ecb75480d14496a8fde00"/43, @ANYRES16=r9, @ANYBLOB="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"], 0x228}, 0x1, 0x0, 0x0, 0x44040}, 0x4014) 01:58:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x16000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 700.182892][T23529] cgroup: Unknown subsys name ''ppp0{wl%n0procvboxnet1&vmnet0' [ 700.199706][T23534] cgroup: Unknown subsys name ''ppp0{wl%n0procvboxnet1&vmnet0' 01:58:52 executing program 4: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x50400, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4622, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6}) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0xffff}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x0, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @multicast1}, {0x2, 0x4e23, @loopback}, {0x2, 0x0, @multicast2}, 0x8, 0x0, 0x2, 0x46a, 0x0, 0x0, 0xfffffffffffffffd}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x0, @rand_addr=0x7f, 0x4e20, 0x4, 'none\x00', 0x17, 0x0, 0xfffffffe}, 0x2c) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRESDEC], &(0x7f0000a8a000)=0x2) 01:58:52 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wl\\n0procvboxnet1&vmnet0\x00') 01:58:52 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x1ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) socket$rxrpc(0x21, 0x2, 0x2) [ 700.385418][T23543] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:58:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe21, 0x0, @local, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:58:52 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair(0x1a, 0x2, 0xfffff7d0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000040)={'macvlan0\x00', 0x9}) r2 = dup2(r0, r0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x4, 0x420, [0x0, 0x200002c0, 0x200004d0, 0x20000610], 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]}, 0x498) [ 700.479065][T23547] cgroup: Unknown subsys name ''ppp0{wl\n0procvboxnet1&vmnet0' [ 700.495176][T23549] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 700.508327][T23551] cgroup: Unknown subsys name ''ppp0{wl\n0procvboxnet1&vmnet0' 01:58:52 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wla\n0procvboxnet1&vmnet0\x00') 01:58:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x18000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:58:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe21, 0x0, @local, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:58:52 executing program 2: syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000080)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000100)) lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) r2 = shmget(0x1, 0x1000, 0x400, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_STAT_ANY(r2, 0xf, &(0x7f0000000200)=""/212) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000001380)={r4, &(0x7f0000000380)=""/4096}) clock_gettime(0x0, &(0x7f0000002980)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002900)=[{{&(0x7f00000013c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000001440)=""/21, 0x15}, {&(0x7f0000001480)=""/30, 0x1e}, {&(0x7f00000014c0)=""/63, 0x3f}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000002500)=""/76, 0x4c}, {&(0x7f0000002580)=""/35, 0x23}], 0x6, &(0x7f0000002640)=""/29, 0x1d}, 0x7}, {{&(0x7f0000002680)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f00000028c0)=[{&(0x7f0000002700)=""/105, 0x69}, {&(0x7f0000002780)=""/155, 0x9b}, {&(0x7f0000002840)=""/93, 0x5d}], 0x3}, 0x6}], 0x2, 0x40, &(0x7f00000029c0)={r5, r6+10000000}) recvfrom$l2tp6(0xffffffffffffffff, &(0x7f0000002a00)=""/163, 0xa3, 0x0, &(0x7f0000002ac0)={0xa, 0x0, 0x0, @initdev}, 0x20) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002b00)='/dev/hwrng\x00', 0x800, 0x0) sendto$l2tp6(r7, &(0x7f0000002b40)="5c548597d2981bc1f084a1d7c6ff78425b91e191d57df43581d2d6f62188c679dc9bd944bf4ca0dceace73614d59d6fe8f0fe3ed8fd006632f563b38887394d14ae6a6d1ed2c25851a0a5f2dc90780ba830f5a106a5da2003e3ad611c42c2f77ae17f22472d8fec2e9714cda0f0f3bc91151c7f45589d593c65d53aa1c80505e129999629889b1e05c03a49136fb2adfc8dace3877fcb70510f8a21ca31828750e51ec5b61da1514146d4b1ed9cf695c0a11773ade06c5409da950d908", 0xbd, 0x40090, &(0x7f0000002c00)={0xa, 0x0, 0x62, @mcast2, 0x10001, 0x3}, 0x20) r8 = gettid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000002c40)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000002cc0)) kcmp(r8, r9, 0x3, 0xffffffffffffffff, r0) [ 700.751478][T23561] cgroup: Unknown subsys name ''ppp0{wla [ 700.751478][T23561] 0procvboxnet1&vmnet0' 01:58:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe21, 0x0, @local, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 700.798068][T23568] cgroup: Unknown subsys name ''ppp0{wla [ 700.798068][T23568] 0procvboxnet1&vmnet0' 01:58:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x19000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:58:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11b000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000240)="450f29f566b89d000f00d0c481a1ec41d466ba4200b84d000000ef430f792e2e420f01c1b988090000b800300000ba000000000f30650fc75e19c744240003000000c7442402c9a322a2c7442406000000000f011c24b9f8020000b8d1000000ba000000000f30", 0x67}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_GET(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) futex$FUTEX_WAIT_MULTIPLE(&(0x7f0000001000)=[{0x0, 0x2}, {0x0}, {0x0}, {0x0}, {0x0}], 0xd, 0x5, 0x0, 0x0, 0x0) [ 701.444024][T21194] tipc: TX() has been purged, node left! [ 701.603886][T21194] tipc: TX() has been purged, node left! 01:58:53 executing program 4: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x50400, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4622, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6}) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0xffff}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x0, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @multicast1}, {0x2, 0x4e23, @loopback}, {0x2, 0x0, @multicast2}, 0x8, 0x0, 0x2, 0x46a, 0x0, 0x0, 0xfffffffffffffffd}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x0, @rand_addr=0x7f, 0x4e20, 0x4, 'none\x00', 0x17, 0x0, 0xfffffffe}, 0x2c) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRESDEC], &(0x7f0000a8a000)=0x2) 01:58:53 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wla%0procvboxnet1&vmnet0\x00') 01:58:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe21, 0x0, @local, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:58:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000001c0)={0x9e0000, 0x1, 0x7f, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0x9b0942, 0x7, [], @value64}}) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f00000002c0)={0xa10000, 0x1, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x980906, 0xf9fb, [], @p_u32=&(0x7f0000000240)=0x6}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r4, 0x5412, &(0x7f00000000c0)={0x0, 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bind$ax25(r9, &(0x7f0000000100)={{0x3, @bcast, 0x5}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) fsetxattr$security_capability(r5, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x3, 0x3}]}, 0x14, 0x2) 01:58:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x20000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 701.768090][T21194] tipc: TX() has been purged, node left! [ 701.846001][T23593] cgroup: Unknown subsys name ''ppp0{wla%0procvboxnet1&vmnet0' [ 701.867318][T23596] cgroup: Unknown subsys name ''ppp0{wla%0procvboxnet1&vmnet0' 01:58:53 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = getpid() sched_getscheduler(r4) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_ROPEN(r5, &(0x7f0000000000)={0x18, 0x71, 0x1, {{0x20, 0x0, 0x7}, 0x2}}, 0x18) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r6, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x800, 0x0) write$P9_RRENAME(r7, &(0x7f0000000080)={0x7, 0x15, 0x1}, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r6) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 01:58:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe21, 0x0, @local, 0x6}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:58:53 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan\nprocvboxnet1&vmnet0\x00') 01:58:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x3f000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 702.112231][T23606] cgroup: Unknown subsys name ''ppp0{wlan [ 702.112231][T23606] procvboxnet1&vmnet0' 01:58:53 executing program 3: socket$inet6(0xa, 0x2, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:58:53 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan#procvboxnet1&vmnet0\x00') 01:58:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x40000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 702.328308][T23618] cgroup: Unknown subsys name ''ppp0{wlan#procvboxnet1&vmnet0' [ 702.346403][T23621] cgroup: Unknown subsys name ''ppp0{wlan#procvboxnet1&vmnet0' 01:58:56 executing program 4: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x50400, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4622, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6}) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0xffff}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x0, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @multicast1}, {0x2, 0x4e23, @loopback}, {0x2, 0x0, @multicast2}, 0x8, 0x0, 0x2, 0x46a, 0x0, 0x0, 0xfffffffffffffffd}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x0, @rand_addr=0x7f, 0x4e20, 0x4, 'none\x00', 0x17, 0x0, 0xfffffffe}, 0x2c) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRESDEC], &(0x7f0000a8a000)=0x2) 01:58:56 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:58:56 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan%procvboxnet1&vmnet0\x00') 01:58:56 executing program 2: readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {0x0, 0x20}, {0x0, 0x1}, {}, 0x0, 0x43}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r3}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001400)={r3, @in6={{0xa, 0x4e21, 0x20, @mcast1, 0x7fffffff}}, 0x5, 0xbb5f, 0x4, 0x5, 0x8}, &(0x7f00000014c0)=0x98) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@in={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000001380)=[{&(0x7f0000000100)="60e4afb92017f3fec315e510ac25cb6bcdcd57876f0f3c96f76fe6aefa3ccfdc965691", 0x23}, {&(0x7f00000011c0)="2a21a237c3740ebac05d5c7eca17d4c2efcde4399fdfe064739699f589a10420f1c7b04d2ca36f8e21064389a29169b71df70544a46de8560408b5559521b0ccab9aeb827d229c9d2de84926ab9778ac0272071889860a27c55459", 0x5b}, {&(0x7f0000001240)="ac672c526c3c00bb6f722676eef573066790eb7c7291bd0f14e267ff0dfc68d23176eec55d3fac6e3218ac3ad12cb9b1652a69743e3273e5b92a5a0d2c014656c39ce324d9424d9f8286f13a1fb9f94df180961f9265b9697053addb16a7c79d278585c4488f6f2c5381afeb7520376701cc12d33aa73e6457b3ba6b260b5ac739f0", 0x82}, {&(0x7f0000000140)}, {&(0x7f0000001300)="b495ae13ac02cc4ea93704dea8e8cf844eceaed52c65825aa8608f2a00428f52d8d9de4e3902c5a81380ed55b0aa4a1babc55e20b42833ffe0b64dea0e963039d7bf38", 0x43}], 0x5, &(0x7f0000001500)=[@authinfo={0x18, 0x84, 0x6, {0x7f}}, @init={0x18, 0x84, 0x0, {0xab5, 0x5, 0x9, 0x4384}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x5}}, @init={0x18, 0x84, 0x0, {0xfffd, 0x8001, 0x8000}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x2}}, @sndinfo={0x20, 0x84, 0x2, {0xfff8, 0x7, 0x6, 0x5, r4}}], 0x98, 0x20000891}, 0x4004080) r5 = syz_open_procfs(0x0, 0x0) readv(r5, &(0x7f0000000580), 0x3c1) statx(r5, &(0x7f00000022c0)='./file0\x00', 0x800, 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) 01:58:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x47efff7f}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 704.411583][T23638] __nla_validate_parse: 10 callbacks suppressed [ 704.411594][T23638] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 704.441721][T23641] cgroup: Unknown subsys name ''ppp0{wlan%procvboxnet1&vmnet0' [ 704.471783][T23644] cgroup: Unknown subsys name ''ppp0{wlan%procvboxnet1&vmnet0' 01:58:56 executing program 3: syz_emit_ethernet(0x3e, 0x0, 0x0) 01:58:56 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan+procvboxnet1&vmnet0\x00') [ 704.559568][T23647] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:58:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x48000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:58:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xd162, 0xd3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000001400)) sendmsg$kcm(r2, &(0x7f00000013c0)={&(0x7f0000000200)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001300)="c5e207c23d895ab3f73c9dbba72fbdaa9c54d637ad044f3d814ba7f2ee674da08ff88572b6e1b3c9664bfe07272131bf0d8cf3c4eac93578d8f39cfbaf723969e24cf2df83e8e4caccc7a7b2e2be2437707986ddb52347d1a61d4707308ac665e97910edf975", 0x66}], 0x1, &(0x7f0000001a00)=ANY=[@ANYBLOB="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"], 0x460}, 0x4) recvmsg$kcm(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {&(0x7f0000000280)=""/91, 0x5}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3}, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, r3, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000001c0)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000001440)={r7, @in6={{0xa, 0x4e24, 0x8, @loopback, 0xeb}}, 0x9, 0x1}, &(0x7f0000000100)=0x90) [ 704.682599][T23651] cgroup: Unknown subsys name ''ppp0{wlan+procvboxnet1&vmnet0' 01:58:56 executing program 3: syz_emit_ethernet(0x3e, 0x0, 0x0) 01:58:56 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan-procvboxnet1&vmnet0\x00') 01:58:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_genetlink_get_family_id$netlbl_cipso(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f0000000080)=0x2) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) r4 = open(0x0, 0x105010, 0x0) getsockopt$SO_J1939_PROMISC(r4, 0x6b, 0x2, &(0x7f00000000c0), &(0x7f0000000140)=0x4) umount2(&(0x7f0000000540)='./file0\x00', 0x0) [ 704.792154][T23657] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 704.893769][T23661] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 704.928800][T23663] cgroup: Unknown subsys name ''ppp0{wlan-procvboxnet1&vmnet0' 01:58:57 executing program 4: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x1, 0x0, 0x4786}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x50400, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4622, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x4e24, @remote}, 0x1b6}) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0xffff}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000340)='vxcan1\x00', 0x0, 0x0, 0x1f}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @multicast1}, {0x2, 0x4e23, @loopback}, {0x2, 0x0, @multicast2}, 0x8, 0x0, 0x2, 0x46a, 0x0, 0x0, 0xfffffffffffffffd}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000001240)={0x0, @rand_addr=0x7f, 0x4e20, 0x4, 'none\x00', 0x17, 0x0, 0xfffffffe}, 0x2c) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_BULK(r3, 0xc0185502, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRESDEC], &(0x7f0000a8a000)=0x2) 01:58:57 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000001c0)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e23, 0x80, @local, 0x42e}}, 0x8, 0x7ff, 0x1, 0x0, 0x4643}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000340)={r7, 0x4}, 0x8) r8 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r8, 0x8983, &(0x7f0000000140)={0x7, 'batadv_slave_1\x00', {0x1}, 0x1f}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[r0, r0, r2, r0]}, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)={0x1c, 0x52, 0x1, 0x0, 0x0, {0x1c}, [@nested={0x8, 0x1, 0x0, 0x1, [@generic="7c7cd8b6"]}]}, 0x1c}}, 0x0) [ 705.824242][T23676] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 705.832503][T23679] cgroup: Unknown subsys name ''ppp0{wlan0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4, 0x8000000, r3, 0x0) r5 = getpgrp(0x0) setpriority(0x0, r5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SOUND_MIXER_READ_STEREODEVS(0xffffffffffffffff, 0x80044dfb, &(0x7f0000000080)) getdents64(0xffffffffffffffff, &(0x7f0000004500)=""/4100, 0x1004) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) lseek(0xffffffffffffffff, 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000680)='/dev/l_op#\x00', &(0x7f00000002c0)='\xdcj_\xdb\xd7\x86,\xb2$,\xa2\xfc^qGM\x1e\xb6\xca5C\xd04X\x8eP\xa9\xa5~8\xfd-f\xa3n\xf2\xba~6\xf3\xb1\x82\xb6d\xe6\x12WRo\x9f\x18\xb4\xf2\x100r\xca\x92;SD\xcc\xab'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00', 0x0]) bind(0xffffffffffffffff, 0x0, 0x46) 01:58:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x4c000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 706.056385][T23689] cgroup: Unknown subsys name ''ppp0{wlanTprocvboxnet1&vmnet0' [ 706.075976][T23693] cgroup: Unknown subsys name ''ppp0{wlanTprocvboxnet1&vmnet0' 01:58:57 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[], 0x0) 01:58:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)={{0x14, 0x10, 0x2}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x58, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vlan0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x9}}], {0x14}}, 0xb4}}, 0x0) [ 706.177376][T23697] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:58:58 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan\\procvboxnet1&vmnet0\x00') [ 706.267547][T23701] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 706.386284][T23704] cgroup: Unknown subsys name ''ppp0{wlan\procvboxnet1&vmnet0' [ 706.399516][T23706] cgroup: Unknown subsys name ''ppp0{wlan\procvboxnet1&vmnet0' 01:58:58 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) close(r0) r1 = accept4(r0, &(0x7f0000000080)=@isdn, &(0x7f0000000100)=0x80, 0x800) setsockopt$packet_buf(r1, 0x107, 0x2, &(0x7f0000000140)="9e6e88aabe3a2dd3f13d289ed114e084da", 0x11) socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8937, &(0x7f0000000240)={'batadv_slave_1\x00', @random="01000a1e240a"}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x14000, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x200000000000001) 01:58:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[], 0x0) 01:58:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x14, 0x30, 0xd31, 0x6}, 0x14}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000200)={'veth0_to_team\x00', {0x2, 0x4e23, @rand_addr=0x64010102}}) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) ptrace$cont(0x9, r3, 0x0, 0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)=r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 01:58:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x60000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:58:58 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan]procvboxnet1&vmnet0\x00') [ 707.241602][T23720] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 707.254213][T23722] cgroup: Unknown subsys name ''ppp0{wlan]procvboxnet1&vmnet0' [ 707.278307][T23725] cgroup: Unknown subsys name ''ppp0{wlan]procvboxnet1&vmnet0' 01:58:59 executing program 2: r0 = socket$kcm(0x2b, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001740)=""/102384, 0x4}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001, 0x3}, 0x3041, 0x0, 0x0, 0x0, 0x4}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0xd9008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x10202, 0x3, 0x2, 0x1, 0x0, 0x7}, r1, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 01:58:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) [ 707.283651][T23724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 707.343595][T23724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 01:58:59 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0\nrocvboxnet1&vmnet0\x00') 01:58:59 executing program 2: r0 = getpid() ioctl$VFIO_CHECK_EXTENSION(0xffffffffffffffff, 0x3b65, 0x0) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="03000000000008000004000000380967f207d598a5b45874729900e9015d72c208429b24c422"], 0x1}}, 0x0) getcwd(&(0x7f00000023c0)=""/4109, 0x100d) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x40, 0x0, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xff], 0x1f000}) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x24044080) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x0, 'ip6gretap0\x00', {0x3}}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='rdma.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) [ 707.386104][T23724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 01:58:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) [ 707.451109][T23724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 707.501693][T23724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 707.528481][T23736] cgroup: Unknown subsys name ''ppp0{wlan0 [ 707.528481][T23736] rocvboxnet1&vmnet0' 01:58:59 executing program 2: unshare(0x40000000) mmap(&(0x7f000032c000/0x2000)=nil, 0x2000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x402040, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0)='gtp\x00') r0 = socket$inet6(0xa, 0x3, 0x3a) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0x990000, 0x400, 0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x990964, 0x8001, [], @string=&(0x7f0000000000)=0x7}}) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80004332}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, 0x1402, 0x8, 0x70bd27, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_NET_NS_FD={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x40000) r2 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r2, r3, 0x0, 0x8607) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x9, 0x0, 0x0, 0x204, 0x0, 0x0, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0xce1e, 0xfffffffd, @local, 0x916d}, {0xa, 0x4e23, 0x802, @empty, 0x7}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) [ 707.549183][T23740] cgroup: Unknown subsys name ''ppp0{wlan0 [ 707.549183][T23740] rocvboxnet1&vmnet0' [ 707.551310][T23724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 01:58:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) [ 707.638333][T23724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 707.691356][T23724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 707.718789][T23724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 707.771096][T23724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 01:58:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) connect(r4, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmsg$unix(r4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000eb3a5b2c1660a8779620cc5021bc73c127bc84d1bb00d13280939719d74bc013761e897dc53bdfcc673bae45ff8c05e127cfb4eb9b2d426910e1ae", @ANYRES32=r3], 0x18}, 0x0) close(r3) r5 = socket$unix(0x1, 0x5, 0x0) close(r5) 01:58:59 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0#rocvboxnet1&vmnet0\x00') 01:58:59 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0x4}, 0x1, 0xfffffffb, 0x1}) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x8) [ 707.832151][T23749] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:58:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x64030000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:58:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8"], 0x0) 01:58:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) close(r1) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x4e21, @broadcast}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) r9 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000100)={0xc9, 0x8, 0x3, 0x5, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r9, 0xc01064b3, &(0x7f0000000140)={r10}) r11 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r11, 0x800442d4, &(0x7f0000000000)=0xff) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c0000dddad6e449a1009096deb2a17566b900000001000000692d67da37a24a888c411d5be03f572e9d68f54c903a9cb61d745d00000000000000000055294ee5376202c571f42027b32db4e09d82d52f47c359a0794d043d3ef2a921d00f264739b7ffba43142f59724612212056a8af11797b7c3c02084bc1a4dd8684e509000000000000009c7c4c8969f30e3ca83d58a9d12c7db8d13fc5eede9900004bc740f54fa089c1f7fdd50cbc615c2cda6d435f86eca07e684c2c02394952171df12e", @ANYRES32=0x0, @ANYBLOB="00000000000000004c0012800b00010069703667726500003c000280080014000080000006001800ff000000060011004e2200000800040000f0ffff050017000000000008000c0002000000060003008f08000008000a00", @ANYRES32, @ANYBLOB="08001f0002000000080004"], 0x8c}, 0x1, 0x0, 0x0, 0x4044084}, 0x0) [ 707.933438][T23753] cgroup: Unknown subsys name ''ppp0{wlan0#rocvboxnet1&vmnet0' [ 707.962645][T23757] cgroup: Unknown subsys name ''ppp0{wlan0#rocvboxnet1&vmnet0' 01:58:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f0000000080)=0x3) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup3(r10, r9, 0x0) dup(r11) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getpeername$packet(r13, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@empty, @ipv4={[0x0, 0x0, 0x8], [], @multicast2}, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x2], 0x0, 0x0}, 0xfffffffa, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r14}) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 01:58:59 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0%rocvboxnet1&vmnet0\x00') 01:58:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8"], 0x0) 01:58:59 executing program 4: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0xa0c2) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="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", 0x1000, 0xfffffffffffffffe) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000080)={0x800100a}) 01:58:59 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x4ea00) 01:59:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x80002, 0x0) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) dup(r4) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000000)=0x1000000) 01:59:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x68000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 708.197511][T23776] cgroup: Unknown subsys name ''ppp0{wlan0%rocvboxnet1&vmnet0' [ 708.220318][T23778] cgroup: Unknown subsys name ''ppp0{wlan0%rocvboxnet1&vmnet0' 01:59:00 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8"], 0x0) 01:59:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0*rocvboxnet1&vmnet0\x00') 01:59:00 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000400)='./file0\x00', &(0x7f0000000180)='omfs\x00', 0x80, 0x0) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc5f0941, 0x0, &(0x7f0000000140), 0x284003, &(0x7f0000000300)={[{@nodiscard='nodiscard'}, {@check_int_print_mask={'check_int_print_mask', 0x3d, 0x101}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x18}}]}) utime(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0xb262, 0x4}) 01:59:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4142, 0x0) write$binfmt_script(r0, &(0x7f0000001540)=ANY=[@ANYBLOB="34dedb3b5ede8d8480cc99fb73defd7b0c431fbe14b40fb11ac4bd4e0228d966cd489f8fe277443b058a5410e67e5fdb0f1584ba202936e2af53eaae"], 0x6c) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="6ffe000000000003000000580001800d0001000bbaf54f0c907fe15b330fe70bc3b5f632e43334abe39c67b3740d5511b3545b80ccc15b4eda4650002b1d5ad4fa1772d4dbafdf948095be9c422d8337eca07c3df0042e199c4ff82b3642e9fc4ed0e85c0fe641e5d98bd32f8bb59a85a11fe7734938589c7d8a49c340d9298d751ef56c53c329f197d351d812c3d1f115382dd0fbddafead487c529ff86b68fa94a725dcdaa8213f544f64b48"], 0x3}}, 0x0) sendfile(r5, r4, 0x0, 0x100000001) 01:59:00 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff0200000000"], 0x0) 01:59:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x6c000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 708.551437][T23800] cgroup: Unknown subsys name ''ppp0{wlan0*rocvboxnet1&vmnet0' 01:59:00 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet(0x2, 0x3, 0x5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getpeername$inet(r4, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000040)=0x10) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x4000, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r5, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x1407, 0x400, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4000) setsockopt$inet_msfilter(r0, 0x0, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="b9"], 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r6 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r6) creat(&(0x7f00000002c0)='./bus\x00', 0x0) r7 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x0) r8 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r8, 0x0, 0x0, 0x4003fe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 708.606843][ T27] audit: type=1804 audit(1589767140.370:555): pid=23804 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir270343946/syzkaller.BsQYcj/580/cgroup.controllers" dev="sda1" ino=16240 res=1 01:59:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0+rocvboxnet1&vmnet0\x00') 01:59:00 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff0200000000"], 0x0) 01:59:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x20a927, 0x2d, 0x0, 0xffffffffffffff9c}) r2 = dup(r1) mmap(&(0x7f000000a000/0x200000)=nil, 0x203f00, 0x0, 0x30051, r2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000040), 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x101001, 0x0) socket(0x11, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r3, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000000)={0x5, 0x0, 0xbb, 0x5}) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) 01:59:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x74000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 708.861708][T23819] cgroup: Unknown subsys name ''ppp0{wlan0+rocvboxnet1&vmnet0' 01:59:00 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000080)={0x7, 0x8}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) preadv(0xffffffffffffffff, &(0x7f0000000140), 0x1, 0x400) creat(&(0x7f0000000000)='./bus\x00', 0x0) connect$ax25(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) dup(r5) ioctl$DRM_IOCTL_FREE_BUFS(r5, 0x4010641a, &(0x7f0000000040)={0x55, &(0x7f00000000c0)}) creat(&(0x7f0000000000)='./bus\x00', 0x0) 01:59:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0-rocvboxnet1&vmnet0\x00') 01:59:00 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff0200000000"], 0x0) 01:59:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000000)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0xffffffffffffffc9) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000001c0)={r3}, 0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={r3, 0x2e, 0x40, 0xd0c2, 0x92, 0x6}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000000100)="7892101a03bb3dca000000008dd1ab14c2623e97b5fdbe025eab7e86f49f034a159010993417776e8dc92b46dfee34effc177c6264315eac6eb617364e1b508f80ec9746f3996329999fdde7f25632c423b68793614dc4157525b3d812c3c52e1eebd415d684594460e3025d161b5a8285e84a", 0x73) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r7 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r8) setuid(r8) 01:59:00 executing program 2: r0 = socket$inet(0x10, 0x1, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) dup(r4) setsockopt$PNPIPE_INITSTATE(r4, 0x113, 0x4, &(0x7f00000001c0)=0x1, 0x4) sendmsg$NFQNL_MSG_VERDICT_BATCH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x11001000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000000303010100000000000000000a0000090c00020000000000000000070c000200e6fffffe000000050c000200fffffffb00000000bad3f4f13a4844401e232e4f0cb78c75aff0e1e78b43ef08e4ddd8b97aef3a36f4cee69c1a47a8a37673b29814d7afcbe764e102d18493277ac5fba9b266fa044c6a84337fe3e64e9f6fefcd4c8b781ab2829534d8d13e3a79bce104418dda7eb6954b65e58fcd544740f473700a9471fb51e59aaf8860557d29a4487b6f00008d1e9aba7832e40cf4f9fa63ecb3ea80081e965ddd7cd36c957b51be518e06aa5ea9e76c49a712597316215cd9096655335fb0a47f82d591c2d4b80dffca9be13cdbc13c9e31fe523074bc7dc443739d50910030a27fde2116e9319289cc1d5891fd7b38c7976c3456690c6778c43502e991847260a98221ffffb4e700000000000000000000000087de20a86ab7e20b94d3ec908f47e757722d807ad71e0b255eb692f2a63ae7aaca69912ccfa2151252323428a788fae0e39fc5824968e32d98b29a81cec6af02f6f0da6723cf97049384765b6eb6b6de467149f435511803a031be0de5548590dd5ef10d260f8fb7853357d238df1daeda88c99d94d47622753773101c2ec895fbab86d0254b262f497f8d92e34f95d0cb5bba910c9eb4f1c9b4ad79b6a88fd965f6a39b26a2467dddd1179e06e2bebdd05af1da59000000632b499181a1dcd089139ad732b33db162da467d6c459a63071a93a9cf28b49163c103f26bffc6d4271761377fa9587be22a4bd1eb4f30dc0f732c772abc55c1db8806a95254f1d3ff733d1c0b4aaa94794fd364eca8cd9ff6b2ba3858242703f1d4b04d54ddbacac8248236c072de707a3c30f4ba9ebca4d97110c038"], 0x38}, 0x1, 0x0, 0x0, 0x5}, 0x400) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x776f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) dup(r7) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x3}) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)}, 0x0) recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0x1b3, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/160, 0x437}, {&(0x7f0000000380)=""/65, 0x41}, {&(0x7f0000000400)=""/96, 0x60}, {&(0x7f0000002580)=""/4096, 0x1008}, {&(0x7f0000000480)=""/119, 0x77}, {&(0x7f0000000040)=""/14, 0xe}], 0x6}}], 0x4000000000004da, 0x42, 0x0) [ 709.168703][T23836] cgroup: Unknown subsys name ''ppp0{wlan0-rocvboxnet1&vmnet0' [ 709.196708][T23842] cgroup: Unknown subsys name ''ppp0{wlan0-rocvboxnet1&vmnet0' 01:59:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff0200"/51], 0x0) 01:59:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x7a000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000000)=0x1, 0x4) syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) setsockopt$inet6_udp_int(r3, 0x11, 0xb, &(0x7f00000000c0)=0x7fff, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) fgetxattr(r6, &(0x7f0000000100)=@known='system.advise\x00', &(0x7f0000000140)=""/3, 0x3) r7 = dup3(r5, r4, 0x0) dup(r7) ioctl$USBDEVFS_RELEASEINTERFACE(0xffffffffffffffff, 0x80045510, &(0x7f0000000180)=0x9) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r7, 0x4008ae48, &(0x7f0000000040)=0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) 01:59:01 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup3(r3, r2, 0x0) memfd_create(0x0, 0x0) write$binfmt_misc(r4, &(0x7f0000000600)=ANY=[], 0x16b) socket$alg(0x26, 0x5, 0x0) sysfs$3(0x3) 01:59:01 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0.rocvboxnet1&vmnet0\x00') [ 709.434746][T23851] __nla_validate_parse: 8 callbacks suppressed [ 709.434758][T23851] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff0200"/51], 0x0) [ 709.577396][T23858] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 709.587756][T23857] cgroup: Unknown subsys name ''ppp0{wlan0.rocvboxnet1&vmnet0' [ 709.608170][T23861] cgroup: Unknown subsys name ''ppp0{wlan0.rocvboxnet1&vmnet0' 01:59:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff0200"/51], 0x0) 01:59:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x7d000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:01 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0/rocvboxnet1&vmnet0\x00') [ 709.876627][T23870] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100"], 0x0) [ 709.932651][T23871] cgroup: Unknown subsys name ''ppp0{wlan0/rocvboxnet1&vmnet0' [ 709.961150][T23874] cgroup: Unknown subsys name ''ppp0{wlan0/rocvboxnet1&vmnet0' [ 710.036460][T23878] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:01 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan00rocvboxnet1&vmnet0\x00') 01:59:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100"], 0x0) 01:59:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x7fffef47}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 710.240384][T23883] cgroup: Unknown subsys name ''ppp0{wlan00rocvboxnet1&vmnet0' 01:59:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) r4 = getpid() perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) ptrace$getsig(0x4202, r4, 0x7ff, &(0x7f0000000240)) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat(r5, &(0x7f0000000000)='./bus/file0\x00', 0x20002, 0x40) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f00000000c0)) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 01:59:02 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0Xrocvboxnet1&vmnet0\x00') [ 710.326101][T23889] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 710.425479][T23893] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 710.570389][T23896] cgroup: Unknown subsys name ''ppp0{wlan0Xrocvboxnet1&vmnet0' [ 710.587706][T23898] cgroup: Unknown subsys name ''ppp0{wlan0Xrocvboxnet1&vmnet0' 01:59:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) dup(r4) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f0000000300)={0x4, 0x400, 0x26, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x306, 0x20000000, [], @ptr=0x8}}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r5, 0x40505331, &(0x7f0000000340)={{0x8, 0x4}, {0x8}, 0x5, 0x3, 0x7}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000705a99a004007a2a30005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="840000002c00270d00"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000040008000c0001007463696e6465780054000200400006003c0001"], 0x84}}, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000740)={0x10}, 0x10}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f0000000200)=[{0x6, 0x0, &(0x7f0000000100), 0x9, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}], 0x4924924924924b3, 0x0) 01:59:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) r4 = getpid() perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) ptrace$getsig(0x4202, r4, 0x7ff, &(0x7f0000000240)) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat(r5, &(0x7f0000000000)='./bus/file0\x00', 0x20002, 0x40) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f00000000c0)) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 01:59:04 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100"], 0x0) 01:59:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x7fffef48}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:04 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0\\rocvboxnet1&vmnet0\x00') [ 713.251746][T23922] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:05 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e"], 0x0) [ 713.307682][T23923] cgroup: Unknown subsys name ''ppp0{wlan0\rocvboxnet1&vmnet0' [ 713.325371][T23927] cgroup: Unknown subsys name ''ppp0{wlan0\rocvboxnet1&vmnet0' [ 713.359878][T23929] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 713.398243][T23930] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:05 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0crocvboxnet1&vmnet0\x00') 01:59:05 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e"], 0x0) [ 713.480378][T23931] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 01:59:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x7ffff000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:05 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) sendmmsg$inet(r0, &(0x7f0000002340)=[{{&(0x7f0000000100)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, &(0x7f0000000540)=[{&(0x7f00000001c0)="80", 0x1}], 0x1}}, {{&(0x7f00000006c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000000)='_', 0x1}], 0x1}}, {{&(0x7f00000009c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a00)="9e", 0x1}], 0x1}}], 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) dup(r6) ioctl$SNDRV_PCM_IOCTL_FORWARD(r6, 0x40084149, &(0x7f0000000140)=0xfff) dup(r3) ioctl$DRM_IOCTL_DROP_MASTER(r3, 0x641f) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000040)={'syz1', "75934c3c4153fc8d6cf01d19934bde4b24607f420669adc35a4c9eb9b87828a7bc2b2a28227b269197dcffedc09eaa8ed3bb7535dc7ed897c7ff36daab74d8025f863a77ff0565bb17128d8352839517af239c75a09674925bf2a272e6b502c451c8ea289f5b5531b56681c294c7d67b6643cab2435b26e62530de12a1f62c2ec6243a9dff222cd71afd4bad52c1ce827c3862b1eef5ee5c75d2ae5887b8"}, 0xa2) r9 = dup3(r8, r7, 0x0) dup(r9) ioctl$KVM_SET_LAPIC(r9, 0x4400ae8f, &(0x7f0000000bc0)={"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"}) [ 713.644515][T23942] cgroup: Unknown subsys name ''ppp0{wlan0crocvboxnet1&vmnet0' [ 713.678696][T23946] cgroup: Unknown subsys name ''ppp0{wlan0crocvboxnet1&vmnet0' 01:59:05 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e"], 0x0) 01:59:05 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0drocvboxnet1&vmnet0\x00') 01:59:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x85000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 713.956339][T23957] cgroup: Unknown subsys name ''ppp0{wlan0drocvboxnet1&vmnet0' [ 713.990413][T23961] cgroup: Unknown subsys name ''ppp0{wlan0drocvboxnet1&vmnet0' 01:59:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) dup(r8) write$capi20_data(r8, &(0x7f0000000380)=ANY=[@ANYBLOB="10002802ff82e30771000000000000000010028d92a72389bab42431e4bf1e897968389830694d036d7ed3d8e1d8b247ba93ce5b59193883a2964d84a2ed3d027855bfcf5a01af4208ba0b22f09397066cb45cfb9cfc735e2068c0d4cb66ef953890ae00c358382c381f0d15a2772d8e37b6b1104a1ab68001ce5dd1b87734f3aa58273619d655fcd47797b9ce3322f7e0fc62d1fddad64f48ec312f0bd7ec3c241da13d2b1e060531de43ae7a2ee96d78fdb0d8b8b412743d4138ade0c06dc074e31e67aca5865679ccf8dec08c9ee769af6d481fde76cbe710e75203d73ac2d0edd08491837e73964198d7f24693b5b6dfe77cc637b0fc76ef4f10ed141221f4ad262d3440dc4c7c86cfe68c47ac757d70032ea4527c5d2a7a35ddf85345d97b98d998497096b5112df2a14b428b8d60fa6362635de21dac5de91f210b2c5374a06a3f96df2c5fb7696de3f11f8a18497a52c216f72df55f710a6f873135f2e3bd67a4a0c3289934955c4562b365f0c2bca2ac6301a79b4831efec32a04544735f5fa2d9bb69d6a800c144c43be13a1a715be9ca0bf7a6574a4e7737bee537237121664fb683158593d1cc7b0c4bac5ff63a39358e5d1a800e78c4c1e6bb9b361c8f31db78163b59a5f2e121c9bbda3ccc1cdd6b5a490574d4fc87f200407473d9ad582a3576e6846b170395be965fd3714e31c5d8a9cb38010fd8cffbb9dbaf65f70e7332c6a4048e7a7b023fe69513573483b1ddab997f8f7525dc6df789fd10ca93e4cb85e80e9146877dd75b9c7f1ec25921cd942da80e2324efd42507d581314f661d8e87f01bfc7e7149c3b3376f7eb620e8c8beb3da67e255bb82b4a23fbb630032d2751077772fd3aa7d901be64bfa4bc34ce24d58c74105813dde59fb54d315b004151a1b0ad1c4e4e7ffd741bab9bc113f0b6cf6856332013d5a90da41b5ea794d0060636d3e0bcec552ec806dbe63c314a37e45679c336ba2843c0df7fe916dba963a8e231a3bee74f252e72cd94c92f91709b677aa5855bc6632630335b4c1571d7d0c8dcabb14f82070d5aaaa330084bed3b59a23db81fbbb4074ae7a4fcbdddbaa7baf8a06b96932d9603eafc286a604e53d3c5a3c6f005b7832bee12837342465776e36b17a5461386a58e9715a966df9f6e3495eb8992b8a4fa253dda0412b6e41e5166b8389dbe6bcfef787161a0476402cea93836bb7605e9cb3f7fd34444582c0f32a02300025a66e5fb67d8ffcf0455470821883f828f47f946ae2795d1040fa1383900e9ed9bd5db831f8ceb072033a2bdcf0385ca041805198e871f675dada7783bc1a86d4e29d57ad186eac716bd3f46f41c0a91053240d818b5c4939db8bc950985c6540dfba5aff390802c82a7a56bb8132e851b28a0695b568a218cafb3be53a8fd7d78e4dcd40ab67af68cc84c489a14b1c92923cfa60b6160951a482162f262d5ab1b7ade408ade65eea233f7171c1549f4e69921928d9c100a9d71e5d24f74a3c28950f2a3b723da8f861ff6036f1efc83ae6c3831ee7411bd911f97908f5176c9dd981682b876b792c7e19b412255e3940deca722a4dba1f93f1bb2e297a187f0f95e14e91a296b3d4baa89d61218c2e10ef39522a3c659e8e36cdd247ddb50217ea4ea061fe0f216b3365eae7a997e41f0a0cc3d6bf7fbecc6e82ab759fa46fcb1ef8a13960a725d1dcbc30320670bcc68f469d897f8d7f24e99ba79fedd1dc8f5b4d70d0cd6eaaa2011c904a8d76b66095b3cf0b044f231ed2fb3e3ba2810a290c6b4617d5c1d5999e2e2d3d239420b2184343468eabc813d50a8f934ef3379cff509fbe755a954fb841b581d1ab6a68a9b53f51c34321ec0e3d7b5fe6b4a7877a42dfac22f1cbb7208277b3e15d7da02bcac3eb9390bbb4862cba752f125f9ee590f784a2a515d17434d4fa03b094e14b54d133086216f4dc08206d7b5837997e8d8df8d052a05ccf4cf89e29d591b1ce760985c5c7fc2b42f05a18b683c59969d8aaadc1a95f9472802c8ae1093f52ba3d2b40a32a7d625149d06d71847ea11e0293daf0c4f5fff858162fe15704cd68d2ef9f6ca5eca891d0e6336306956334eefd1b197c7ec5795a1dc022e5f9d10ff0b7524a2b7eea9d14a021592b5073bd4ee4c8d9b5c12759fed82f73fe214baa5d042f89cb36af7315b2e957a968034f6ff150b53a1d34e7ca7ad054f7038ac10dd12a1abe9370db82914dde36ec4a2203b5795ac60c4b6664f8fc92ce05591181d89414c50a95b25c68b143b8350bedf80b6f5343f887384bb55bc04ba5f2dae0f1ad9babf7b9538a64fb275e624b8e305d7e1a664d39344d79e2c21aa7a02c98b666bad1fb787a2c70efe865fd27c1f8b27cc26dbf5d2aa2274c077ebdab5decf692efdc83708eeb8821a24ea619d32269b2ac1c57fb7c065bf6cbaac45d6b902ce1950f57e7ba2782904760669aafb66392352179a6512e3208bf9116849c87193980b70bb4924ba2fb7624fde41faf52b6626b97b14f87fc49b93e4b5a7f8124a447988230a9057478d3e2c940444c9765d6af9c136ca347b85a146ff849edf971de355f06cf8e6967a230875fd831dd9f99c561948d6ccd1fc4949782fdf20fbac87de4de47a49f9b7e9cf712c55798ad56ea5ea8c4df998b46636a4e4f263f991a1c57cd92c8de044ff8e8a542799e670830fab0fb080c36a792c70b01ce8120c23b535b77b0ac609669a121e30b44d85785881cfbf1e0514d650629f185e4460c7e224689e517575f661da33c5471983804adf7a562e58cd2362ff26da5567115c31033049d74d74f024443eaf889fd33356b2633b3c5ac65d9123411b93b2959314cbb97ab46e88c842b805d4735dbe3df4c7d35bed68304b577b7214bf0f5e0dfcee9fb20f46dce37df695d125c15693d977b89bf3455cfd8b0311233eb050ac2582ee453d6abbef077a4e7460812ed5cfad861ed4f8b4d9c01964f8f8428cb17b0fea92d8d264b140754d1e2bae96f8aa53edd20d412999fe8a270c98622798c9ad1bd76c9f134af66b9be4076f5d337513e970c9933fc5383a9b214a4b8259ba0d6328d56ea6c93dce90fb647dbe7ce87b9c070ad3f2e9cc3b3a3bca0599d621b3a7863a3230a8271f321fdf4388a04055b913f41d8a30458f7832e010c442fbe0181095e0deb3581be22ca2370d862fc45817e7f37f2f6a371dba15f43ce2faee653a3a2ad126300d32dc435fe97198f775ebff74e674a30886c54d924b86650da69bee078d1abcf4bda8bfe9c1137db4bef5717bf1893954afa8af3f125c12452a20c4f7cb6367360e876c620278469a95d165c963cd575142c018088c9f9118c2403e9c5b04b802146a145e69363c90085a5774664976f86d6f5860281f1bb4e435198a7f563e02cee072f5dd2169f0775052f2305a4a7b0a7b7b2542a333e21cd00743b6383b25bdb90b43d7e86302e42ffac1a7e0316dadc1e701059ccadce5e5f0b2bdc26ae880b3c6af643fc0adf1a12eee98774d1c01a60960e54e1d19723704390d08baa9b712195093c3fdfb9098e3f05a0b241838ca3ebe6ab2bbe73f52ede16a19418867d2079b7c8574ba9d834f5f013188cf258110a417cb95f195c761756b584ed6cdcdeed1129665df53c4e4ab2ae019d3cf030fc145f226be0e8642f66c25dd680438388272791e8570567b8b555c86b8419249f1f5273400154a4ffe81b6855d25c62dc63681576464bfa86ee7b2702a26d369626c6624cc5217912467e4400cd99320bf03f196d450e77a76880a695f360d90d3a1f2a45845b4cb0ed147d498ef7afc9a0b1240b9f0e1c8cc2d8651a01eb5fb87f552e85d95ccf26f82f8558e7bc9607e09afe0a8aee3272a5cbc4c81e52925ee383decec856e3032399ee2e8f0190566a46a51f69a4bda33fe354345cb015dabba5dd1512476079ac997c9c5039d47fd2b532e47ee3a36d0cb26447bb421d791719e391c40c7b57ff72840caeef4d4994468214f0589d4eba5b0d7c709adeeb3141e867dfff9a5c36e730bfc00714a0d5775c68ec5e679b215d65ceb221a2c75756d5773cfba815ca19569c98484e223638e1eb9fc14bf267324bf0c226358795cab9f0df052b7358994a73dd2d6cd3a75da2ad3c1c38392bd9138efb588c2330b1646c0f515ef35d9ff3067d6926fa34bf89d3a29ab7e3edc38992768f77389399c3b130a2f8e23c0d588761a231464ce21e2e0a7fd3168b8f9f0c2fdd429989d2564d4ddc87da6808abf1b62682ef31fa22e543cd850709c7409ed647b3e5809d84c6ec6a18f807c395b00fed64535842d60b5711f37bf8b0af56786faae5d99e620143deefce493361ed52f7ac14bd1323c3acd7fa65df744445260f865c9e75181938619c2e1f4505a9ed922fe8287121a1716e3ea0fce828b34c64f2fa4c0035d05e1a3d7e3cb575ec4bd29a5a8faea27e4f70f09829e2a548f5a953909ff098fa4815d8a2a7ec20b7cca01347b0fb28af2c2e50de22593687630d2a8032cac98295a04b9ffb88b093d27fe0b34bc199bb71770a1449260a7720a109464da8ff8a27469aa0fe55195beed86cdba1a9100afc2b29e65d6410fbf59739570cae2fe34f84921a94cf906ca561e832d8a33f9b5cc583f05a0f9e9f529033bc0f5b3fa640907e731b8711cf9685105397a4a924d509f6dad06cde969b6fa5e4a886c7b0672738ecaa7e0996120f778b80d8a8edf0755194990efb803fe45690979be1eb1a8fda1efecda3d346b665f0a2449581bef504db11747a6259036cea8d058634e9d1e7eb39798579ed21e3c4b07fe5b4b401874a30a1fc302e694cb2737340678bcbc8f00badee543842f3e7d621058953e56393fdb5689152aa8c4589986307aec78b86c65219f68e77aefff78f32b5e1fd3c6dfd615662b4754637092038d5b71a8dd42da0c2a2c06fc4407f2e939e4c733801d34946db82245f01a55a99f00f289e817fa7d7ed28616ae1b5af5b6b0088bdbdf3a85e8bc5328518e43c0f4fedbbb9e08f4d161b09798b687b982ee241f8736c37a419875f0dbea4ed5a56d9c7cdeb33e829f43f39ccb5f1c7c7b5d12f3b3dc37b4a8a387355a8015dd625f6c9774fba9d4500b2a7c1d3878bba8125b9a096e4e53f6c791af99ce58e270b82ecd6ee0b9fa7248a4fbe56c52c6411de46dd4cdf9be8d0fde99806bd6312812893a3cfd17d928e4e27db7d09c59637ec3e8630a7644ff31563be9e915def3b3eeaef1483d9035e55238292b4b6ab3ad476ec67886fef06655a8072fb002c5f90cf1e7b7922724da2354fcfd6e5ac9f8845a8b3b6b7d3e8b74c13ff63311729dbb32415e0edf301127c966c10fdcd09c61e5f07c0dbb62e3bfb53e19dab7e32f10c4c28b945a43b300aa5e5d0d97df881c6f7cf030799c536bd12bfd8107b235628db9872c25000085fcbe95f4efd645304f0b44898f824e9d77223c2a0f6ab0555c155d2920bb7309a5c8881a49d7282bb4c68a9ca3be45243da7ee2e2cb61c2b53814b16bf70e02fe2b4d348a374be08ce2b1bf787d3ebffaf5a2ff4cf31479067ec9f75ea47fe30c612386950cff719ee43769df7812ce337d6c14a5a782527b18a42f74072339ccc8ae40d6f370f933eecb26f75365b859906c20b93ddf24a65dd8a001f469f4863e45227be5e113915769ac1b1fa27c0b8201424926132a540d98be64a62721f93ffbd68536a07dc117b71395568454bd08dbf5a960d5b78eaae5cd13f4adbcb3a952d82dde3313ee49b9251a9c06f0a551ddeff11253b09b54cbfda3c93b85a682"], 0x1012) r9 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r9, 0x4020ae46, &(0x7f0000bf7000)={0x1, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:59:06 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200b87b35ebe04114272d38c8ff477fbefaff01", @ANYRES32=0x0, @ANYBLOB="040000000000000008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000000000000002000000000000000"], 0x3c, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x800000, &(0x7f0000000100)=ANY=[@ANYBLOB="757065f26469723d7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c00"/51]) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='sockfs\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4), 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) dup(r4) ioctl$TIOCGISO7816(r4, 0x80285442, &(0x7f0000000040)) 01:59:06 executing program 3 (fault-call:0 fault-nth:0): syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x9effffff}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:06 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0irocvboxnet1&vmnet0\x00') [ 714.578789][T23973] __nla_validate_parse: 8 callbacks suppressed [ 714.578800][T23973] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 714.598646][T23974] FAULT_INJECTION: forcing a failure. [ 714.598646][T23974] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 714.604509][T23972] overlayfs: unrecognized mount option "upeòdir=werdir=./file0" or missing value [ 714.634471][T23975] cgroup: Unknown subsys name ''ppp0{wlan0irocvboxnet1&vmnet0' [ 714.637728][T23974] CPU: 0 PID: 23974 Comm: syz-executor.3 Not tainted 5.7.0-rc1-next-20200415-syzkaller #0 [ 714.653400][T23974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.663492][T23974] Call Trace: [ 714.666835][T23974] dump_stack+0x188/0x20d [ 714.671271][T23974] should_fail.cold+0x5/0x14 [ 714.676023][T23974] ? setup_fault_attr+0x1e0/0x1e0 [ 714.681118][T23974] ? mark_held_locks+0xe0/0xe0 [ 714.685988][T23974] ? mark_held_locks+0xe0/0xe0 [ 714.690913][T23974] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 714.697602][T23974] __alloc_pages_nodemask+0x17a/0x810 [ 714.703087][T23974] ? __alloc_pages_slowpath.constprop.0+0x2660/0x2660 [ 714.710021][T23974] ? tun_build_skb.isra.0+0x1dc/0x13e0 [ 714.715504][T23974] alloc_pages_current+0xff/0x200 [ 714.720642][T23974] skb_page_frag_refill+0x25d/0x560 [ 714.726120][T23974] tun_build_skb.isra.0+0x252/0x13e0 [ 714.733446][T23974] ? tun_xdp_act.isra.0+0x800/0x800 [ 714.738753][T23974] ? __lock_acquire+0xcbb/0x4c50 [ 714.743721][T23974] tun_get_user+0x834/0x3c70 [ 714.748863][T23974] ? tun_build_skb.isra.0+0x13e0/0x13e0 [ 714.755381][T23974] ? tun_get+0x16d/0x290 [ 714.759659][T23974] ? lock_downgrade+0x840/0x840 [ 714.765321][T23974] ? rcu_read_lock_held_common+0x130/0x130 [ 714.771187][T23974] tun_chr_write_iter+0xba/0x151 [ 714.776322][T23974] new_sync_write+0x4a2/0x700 [ 714.781118][T23974] ? new_sync_read+0x7a0/0x7a0 [ 714.786174][T23974] ? rcu_read_lock_held_common+0x130/0x130 [ 714.792003][T23974] ? apparmor_path_rmdir+0x30/0x30 [ 714.798808][T23974] ? security_file_permission+0x8c/0x470 [ 714.804553][T23974] __vfs_write+0xc9/0x100 [ 714.808989][T23974] vfs_write+0x268/0x5d0 [ 714.813254][T23974] ksys_write+0x12d/0x250 [ 714.817605][T23974] ? __ia32_sys_read+0xb0/0xb0 [ 714.822565][T23974] ? __ia32_sys_clock_settime+0x260/0x260 [ 714.828663][T23974] ? trace_hardirqs_off_caller+0x55/0x230 [ 714.836761][T23974] do_syscall_64+0xf6/0x7d0 [ 714.841396][T23974] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 714.847553][T23974] RIP: 0033:0x416561 [ 714.851494][T23974] Code: 75 14 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 c4 1b 00 00 c3 48 83 ec 08 e8 ca fc ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 13 fd ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 714.872243][T23974] RSP: 002b:00007f249d7fdc60 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 01:59:06 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write$P9_RCREATE(r2, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x80, 0x2, 0x4}, 0x2}}, 0x18) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) dup(r7) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001180)={r7, &(0x7f0000000100)="38eadfcaed00564945dda6f600b238632d7bb43b7a1e14eb4de382f8d9ad7926ba506982c7078cd714b56669e0657b5acb19da43e5d21f5829f4bf2380751feecbe02b6b1fc64037ae9e28b6cc836cbbaa17d62fe5c4fb1353dd3ffb8c1f14708c1ea10baa9898759518ec86047876ade10ab274d0c3a706", &(0x7f0000000180)=""/4096}, 0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x201}, 0x20) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x38000, 0x0) ioctl$MON_IOCH_MFLUSH(r8, 0x9208, 0x8000) ftruncate(r4, 0x200004) sendfile(r0, r4, 0x0, 0x80001d000010) 01:59:06 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0lrocvboxnet1&vmnet0\x00') [ 714.881376][T23974] RAX: ffffffffffffffda RBX: 0000000000507dc0 RCX: 0000000000416561 [ 714.890314][T23974] RDX: 000000000000003e RSI: 0000000020000040 RDI: 00000000000000f0 [ 714.898900][T23974] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 714.907925][T23974] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 714.916355][T23974] R13: 0000000000000bbe R14: 00000000004ce06b R15: 00007f249d7fe6d4 [ 714.994136][T23979] overlayfs: unrecognized mount option "upeòdir=werdir=./file0" or missing value [ 715.022314][T23989] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:06 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200b87b35ebe04114272d38c8ff477fbefaff01", @ANYRES32=0x0, @ANYBLOB="040000000000000008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000000000000002000000000000000"], 0x3c, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x800000, &(0x7f0000000100)=ANY=[@ANYBLOB="757065f26469723d7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c00"/51]) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='sockfs\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4), 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) dup(r4) ioctl$TIOCGISO7816(r4, 0x80285442, &(0x7f0000000040)) 01:59:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xa5000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 715.168567][T23996] cgroup: Unknown subsys name ''ppp0{wlan0lrocvboxnet1&vmnet0' [ 715.190335][T23999] cgroup: Unknown subsys name ''ppp0{wlan0lrocvboxnet1&vmnet0' 01:59:07 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0orocvboxnet1&vmnet0\x00') 01:59:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="756203"]) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='tracefs\x00', 0x0, &(0x7f0000000200)) [ 715.366602][T24003] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 715.467403][T24006] overlayfs: unrecognized mount option "upeòdir=werdir=./file0" or missing value [ 715.496603][T24011] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 715.519186][T24010] cgroup: Unknown subsys name ''ppp0{wlan0orocvboxnet1&vmnet0' [ 715.552434][T24017] cgroup: Unknown subsys name ''ppp0{wlan0orocvboxnet1&vmnet0' 01:59:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xf0ffffff}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:07 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6b) r1 = dup(r0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@private1={0xfc, 0x1, [], 0x1}, 0x4, 0x0, 0x1, 0x0, 0x8001, 0x800}, &(0x7f0000000100)=0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103}, 0x20) setsockopt$inet6_int(r2, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) sendmsg$inet6(r2, &(0x7f0000000180)={&(0x7f0000000080)={0xa, 0x4e22, 0x1000000080000, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1400000000000000290000000b"], 0x18}, 0x0) 01:59:07 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0srocvboxnet1&vmnet0\x00') [ 715.780438][T24022] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 715.858810][T24027] cgroup: Unknown subsys name ''ppp0{wlan0srocvboxnet1&vmnet0' [ 715.879154][T24029] cgroup: Unknown subsys name ''ppp0{wlan0srocvboxnet1&vmnet0' [ 715.880786][T24030] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:07 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:07 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x1, 'wg1\x00', {}, 0x401}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x13}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={'veth1_to_bond\x00', {0x2, 0x4e21, @broadcast}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) dup(r7) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r7, 0xc0984124, &(0x7f0000000280)) 01:59:07 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0urocvboxnet1&vmnet0\x00') 01:59:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xf5ffffff}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 716.207114][T24039] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 716.228181][T24040] cgroup: Unknown subsys name ''ppp0{wlan0urocvboxnet1&vmnet0' [ 716.248148][T24047] cgroup: Unknown subsys name ''ppp0{wlan0urocvboxnet1&vmnet0' 01:59:08 executing program 3: syz_emit_ethernet(0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 716.270023][T24049] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:08 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0xrocvboxnet1&vmnet0\x00') 01:59:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xfeffffff}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:08 executing program 3: syz_emit_ethernet(0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 716.506409][T24054] cgroup: Unknown subsys name ''ppp0{wlan0xrocvboxnet1&vmnet0' 01:59:08 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0p\nocvboxnet1&vmnet0\x00') [ 716.563768][T24059] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:08 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000540)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[], 0x18}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000031c0), 0x7ab, 0x2, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee00, 0x0) keyctl$chown(0x4, r1, 0x0, 0x0) keyctl$set_timeout(0xf, r1, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x1404, 0xc20, 0x70bd27, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x3f}]}, 0x20}, 0x1, 0x0, 0x0, 0x24000004}, 0x20000000) syz_mount_image$ceph(&(0x7f0000000140)='ceph\x00', &(0x7f00000001c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="f7a6b0f1674d6007400bd0ef4a7c2c", 0xf, 0x8}], 0x50040, &(0x7f0000000280)='\x00') mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x4010, 0xffffffffffffffff, 0x0) 01:59:08 executing program 3: syz_emit_ethernet(0x7e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 716.662545][T24062] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xfffff000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 716.732365][T24065] cgroup: Unknown subsys name ''ppp0{wlan0p [ 716.732365][T24065] ocvboxnet1&vmnet0' [ 716.761629][T24071] cgroup: Unknown subsys name ''ppp0{wlan0p [ 716.761629][T24071] ocvboxnet1&vmnet0' 01:59:08 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0p\\ocvboxnet1&vmnet0\x00') 01:59:08 executing program 3: syz_emit_ethernet(0xfdef, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:08 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @dev}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a543) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810ee0f, 0x0) pipe(&(0x7f0000000040)) 01:59:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xffffff7f}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:08 executing program 3: syz_emit_ethernet(0x2000007e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 717.101423][T24089] cgroup: Unknown subsys name ''ppp0{wlan0p\ocvboxnet1&vmnet0' [ 717.120833][T24092] cgroup: Unknown subsys name ''ppp0{wlan0p\ocvboxnet1&vmnet0' 01:59:09 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0pr\ncvboxnet1&vmnet0\x00') 01:59:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xffffff9e}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:09 executing program 3: syz_emit_ethernet(0xfffffdef, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 717.385400][T24106] cgroup: Unknown subsys name ''ppp0{wlan0pr [ 717.385400][T24106] cvboxnet1&vmnet0' [ 717.401287][T24113] cgroup: Unknown subsys name ''ppp0{wlan0pr [ 717.401287][T24113] cvboxnet1&vmnet0' 01:59:09 executing program 3: syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:09 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0pr%cvboxnet1&vmnet0\x00') 01:59:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xfffffff0}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:09 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000005dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000fff00"/20, @ANYRES32=0x0, @ANYBLOB="00001800000000002828b71170b462657a080001007e7372001c000280080000f6", @ANYRES64=r5, @ANYBLOB="051db76684e2a406b10003000000000008000200", @ANYRES32=r4, @ANYBLOB], 0x48}}, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x50, 0x50, 0x2, [@struct, @enum={0x10, 0x7, 0x0, 0x6, 0x4, [{0xc, 0x1}, {0x4, 0xffffffff}, {0x6}, {0x1, 0x93}, {0xe, 0x6}, {0x1, 0x9}, {0x0, 0x8}]}]}}, 0x0, 0x6a}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000380)='GPL\x00', 0xfffffecc, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1b, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r8}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r3, 0x10, &(0x7f0000000240)={&(0x7f00000001c0)=""/24, 0x18, r8}}, 0x10) [ 717.725077][T24123] cgroup: Unknown subsys name ''ppp0{wlan0pr%cvboxnet1&vmnet0' 01:59:09 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c203000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'ipvlan1\x00', 0x0}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) dup(r6) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYRES64=r1, @ANYRESOCT, @ANYRESDEC=r1, @ANYRESHEX, @ANYRESDEC=r3, @ANYBLOB="72dca48d37d63b77f625793d23e4b0cdcc205d"], 0x7c}}, 0x0) r7 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f0000000200), 0x4924924924926d3, 0x0) 01:59:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xfffffff5}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:10 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0pr\\cvboxnet1&vmnet0\x00') 01:59:10 executing program 4: unshare(0x6000400) socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x1f) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x9, 0xc0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000080)=[@timestamp], 0x1) dup(r1) pselect6(0x40, &(0x7f0000000300)={0x3}, 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 01:59:10 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c205000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 718.814161][T24153] cgroup: Unknown subsys name ''ppp0{wlan0pr\cvboxnet1&vmnet0' [ 718.842001][T24158] cgroup: Unknown subsys name ''ppp0{wlan0pr\cvboxnet1&vmnet0' 01:59:10 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c206000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x21, 0x2, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) close(r4) 01:59:10 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0pro\nvboxnet1&vmnet0\x00') 01:59:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xfffffffe}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='setgroups\x00') listen(0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) dup(r4) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r4, 0x80045300, &(0x7f0000000000)) tkill(0x0, 0x33) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) fchmod(r1, 0x0) 01:59:10 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c207000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 719.104961][T24170] cgroup: Unknown subsys name ''ppp0{wlan0pro [ 719.104961][T24170] vboxnet1&vmnet0' [ 719.128806][T24176] cgroup: Unknown subsys name ''ppp0{wlan0pro [ 719.128806][T24176] vboxnet1&vmnet0' 01:59:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000080)={0x1, 0x4}) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x2d, 'memory'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x1f) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/if_inet6\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x51) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x7ffff000) socket$inet(0x2, 0x0, 0x84) syz_open_procfs(0x0, 0x0) socket$unix(0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = shmget(0x2, 0x3000, 0x10, &(0x7f0000ffa000/0x3000)=nil) shmat(r3, &(0x7f0000ff9000/0x3000)=nil, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 01:59:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0xa, 0x4e20, 0x0, @local}, 0x1c, 0x0}, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040000000000000008000000", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="7050bf2d3ad15d104bb0000100bd48d7d39e42bc88fe389358514d8a7da816e4a43c367876ef98f9656f3c471923e5515877628b404c9b02cdb173977568e119414089a1dffaf57779482a4e00a230e5d7108d07ec7df53e7ba24680fef6ad36bc", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10005cfbd64b13000000000000000000"], 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x800000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 01:59:11 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0pro#vboxnet1&vmnet0\x00') 01:59:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c208000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x7ffffffff000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 719.454465][T24191] cgroup: Unknown subsys name ''ppp0{wlan0pro#vboxnet1&vmnet0' 01:59:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c211000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:11 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0pro%vboxnet1&vmnet0\x00') 01:59:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xf0ff7f00000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c230000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 719.814298][T24210] __nla_validate_parse: 16 callbacks suppressed [ 719.814308][T24210] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 719.814751][T24209] cgroup: Unknown subsys name ''ppp0{wlan0pro%vboxnet1&vmnet0' [ 719.879995][T24212] cgroup: Unknown subsys name ''ppp0{wlan0pro%vboxnet1&vmnet0' [ 719.906204][T24214] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 719.929750][T24200] overlayfs: filesystem on './file0' not supported as upperdir 01:59:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xf0ffffff7f0000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:11 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0pro*vboxnet1&vmnet0\x00') 01:59:11 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c211000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 720.161933][T24219] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c260000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 720.203073][T24221] cgroup: Unknown subsys name ''ppp0{wlan0pro*vboxnet1&vmnet0' [ 720.229073][T24225] cgroup: Unknown subsys name ''ppp0{wlan0pro*vboxnet1&vmnet0' [ 720.251576][T24228] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:12 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200030086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:12 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0pro+vboxnet1&vmnet0\x00') 01:59:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xf0ffffffffffff}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 720.415754][T24233] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:12 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200050086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r1, 0xc01864ba, &(0x7f0000000000)={0x0, 0x5, 0x21}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f0000000240)={0x5, "c9d1c16723dbef646d00da76ba46981a86c998bfaca840930b90fe4ed891dd70", 0x3, 0x53, 0x4, 0x1000, 0x2000404, 0x8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r7, r6, 0x0) pidfd_open(0xffffffffffffffff, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r8, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r9 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_GET_KEEP_ORPHAN(r10, 0x2288, &(0x7f0000000300)) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0xffff, 0x8, 0x0, r9}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000000140)="f5742d201a8837f00fabfcbc2426ed1942761a0d0a3f529cfde9eb1e16546ce3bb8a49def956035b2f14b75d0ed743a221b98dc56cd7589142547556c198f77fe63100f91a913113d340db0c12c97afb93a3b0768f7dbb3e179ad84fd9679f8b177d34a845d6a4462bc9f092", 0x6c, r11}, 0x68) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6, 0x400, 0x6, 0x7, 0x0, {0x3, 0x0, 0x7, 0x2, 0x100, 0x2, 0xffff, 0x8, 0x0, 0x2, 0x9, 0x9, 0x0, 0x0, "c5012eaa77b029a95120c8eba9f175560d69a41c302e544c322ed22e9f6e4a76"}}) [ 720.478985][T24236] cgroup: Unknown subsys name ''ppp0{wlan0pro+vboxnet1&vmnet0' [ 720.502249][T24238] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:12 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0pro-vboxnet1&vmnet0\x00') 01:59:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x100000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x3c9510ed24232f4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x20}, 0x0, 0x2, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r3 = socket(0x23, 0x5, 0x0) close(r3) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000000), 0x2) 01:59:12 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200060086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 720.726438][T24249] cgroup: Unknown subsys name ''ppp0{wlan0pro-vboxnet1&vmnet0' [ 720.748855][T24253] cgroup: Unknown subsys name ''ppp0{wlan0pro-vboxnet1&vmnet0' [ 720.767075][T24255] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:12 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0pro.vboxnet1&vmnet0\x00') 01:59:12 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200070086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 720.878594][T24260] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000540)={0xffffffffffffffff}) getsockname$packet(r0, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a40)=0x14) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x1, 0x0) recvmsg$can_j1939(r3, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000340)=""/204, 0xcc}, {&(0x7f0000000440)=""/194, 0xc2}, {&(0x7f0000000540)}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f00000005c0)=""/104, 0x68}, {&(0x7f0000000640)=""/168, 0xa8}, {&(0x7f0000000700)=""/177, 0xb1}, {&(0x7f00000007c0)=""/11, 0xb}, {&(0x7f0000000800)=""/14, 0xe}, {&(0x7f0000000840)=""/41, 0x29}], 0xa, &(0x7f0000000940)=""/67, 0x43}, 0x1) r4 = dup(r2) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a80)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r5, @ANYBLOB="00000000020000001c001a8018000a8014000000000000000000000000000166d8290000000000"], 0x3c}}, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x1a1800, 0x0) r7 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(r6, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r7, 0x20, 0x70bd26, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private2}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @local}]}, 0x30}, 0x1, 0x0, 0x0, 0x801}, 0x20000080) 01:59:12 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200110086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x200000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 720.991922][T24264] cgroup: Unknown subsys name ''ppp0{wlan0pro.vboxnet1&vmnet0' [ 721.013566][T24266] cgroup: Unknown subsys name ''ppp0{wlan0pro.vboxnet1&vmnet0' 01:59:12 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0pro0vboxnet1&vmnet0\x00') 01:59:12 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200200086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 721.141544][T24276] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:13 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="240000001800dd8d13840a5d40000000020010002000fe020000000008000400", @ANYRES32], 0x24}}, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="5e247ade2a2fe3fc0dacbf1409bbb67f6055d66b96dbb5e50cb7dd9952127a95e32e2b031f31c32c51cc13f4f34b2cf6924c5a0deaac1c", 0x37}, {&(0x7f0000000040)}, {&(0x7f0000000080)="f9f34e7b27f6ad84b4bf17e0e13c6d0f6a00afe2fa13a0252bd322ce6f41d37edc7603d5c4e20560a61c7eefbebe4713ce842f0a39875dc7f85bfb8ded96f5215a000b2c390439853892711ad1281e6cab0f7ba326498d407cece63616b52d53eb2d2b6597b962ddffbcf1e8e24023e8404522b6e722a27487cfbc094c1400", 0x7f}, {&(0x7f00000002c0)="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", 0x111}], 0x4, &(0x7f0000000040)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x4010) [ 721.232214][T24279] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 721.250085][T24281] cgroup: Unknown subsys name ''ppp0{wlan0pro0vboxnet1&vmnet0' [ 721.268438][T24283] cgroup: Unknown subsys name ''ppp0{wlan0pro0vboxnet1&vmnet0' 01:59:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200300086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:13 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0proXvboxnet1&vmnet0\x00') 01:59:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x300000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:13 executing program 5: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000000)='./file0\x00', 0x2000000000, 0x0, 0x0, 0x18400, &(0x7f0000000040)={[{@type={'type'}}, {@part={'part', 0x3d, 0x800}}]}) 01:59:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200400086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 721.550313][T24296] cgroup: Unknown subsys name ''ppp0{wlan0proXvboxnet1&vmnet0' 01:59:13 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0pro\\vboxnet1&vmnet0\x00') 01:59:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x400000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 721.704040][T24303] hfs: unable to parse mount options 01:59:13 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(0x0) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000180)) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000000)={0x0, 0x1}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f00000000c0)={0x0, 0x34}) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/166}) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000940)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="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"], 0x33c}, 0x1, 0x0, 0x0, 0x20000801}, 0x80) lseek(r0, 0x8000, 0x3) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f00000000c0), 0x0) open(0x0, 0x105010, 0x0) socket(0x10, 0x80002, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) [ 721.739913][T24306] cgroup: Unknown subsys name ''ppp0{wlan0pro\vboxnet1&vmnet0' [ 721.757973][T24311] cgroup: Unknown subsys name ''ppp0{wlan0pro\vboxnet1&vmnet0' [ 721.796865][T24303] hfs: unable to parse mount options 01:59:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200600086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = gettid() r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x210900, 0x0) getsockname$netrom(r5, &(0x7f00000000c0)={{0x3, @default}, [@null, @bcast, @null, @netrom, @rose, @remote, @null]}, &(0x7f0000000180)=0x48) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r6, &(0x7f0000000000/0x4000)=nil, 0x0) shmctl$IPC_RMID(r6, 0x0) ptrace$cont(0x7, r1, 0x4, 0x7) shmctl$SHM_STAT(r6, 0xd, &(0x7f00000001c0)=""/83) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000e942ce08000000000000009c15c4b600240012cdae868e12a9a9ee05a17ec4d3800b00010067656e652f75b1065363d898ab7665000014000280f1e235f06c9dc5f6282e9615ba36b366f151510416ff5835e4338c0604e1726697351ec71129a1435a51cf8b18197b4e83e01a0fee10764b70ee68a0556bd3cd436977ff9b3c6b7d9af02a4718d11cdc7e727bea9bdd0ec9acf67f9b88b1812f05b0688fdf19961fe27596dc05645a1e"], 0x4c}}, 0x0) 01:59:13 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0prodvboxnet1&vmnet0\x00') 01:59:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x500000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200ff0086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r5) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000020008112950f80ecdb4cb9020212000400000001810040fb12000a00040fac57a12d19a906000568030f", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 722.207155][T24331] cgroup: Unknown subsys name ''ppp0{wlan0prodvboxnet1&vmnet0' 01:59:14 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200030086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x600000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:14 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0proivboxnet1&vmnet0\x00') 01:59:14 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200050086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:14 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @local=0x500}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0100000000000000000009000000240004800c00078008000500020000001300010062726f6164636173742d6c696e6b0000c4f88e7574330d7f1a9a72b6369358850113749d4c61808ee62fb5a772da6e435e34b6688adab44f506cf1956ee46a3028e7a97799a2df9da7b49260fb1a48d94cc29ed3989099e3cfc1513192d4080423a78cfa8f8f773c780df4fd96bba5aa90c90a8361a881f98941338dd00d835e27"], 0x38}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x178, r6, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xc4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x97b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc00000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x899c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x943e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_SOCK={0x40, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2d}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xa884}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x62081cef}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x178}}, 0x4004) [ 722.461438][T24349] cgroup: Unknown subsys name ''ppp0{wlan0proivboxnet1&vmnet0' [ 722.480249][T24352] cgroup: Unknown subsys name ''ppp0{wlan0proivboxnet1&vmnet0' 01:59:16 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) lsetxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x5, 0x1, 0x11, 0x871, 0xda, "f15856197e0016c2e9d1aac55756c201e1e24e5e0b041be82ff610709bcb5218cd82574800b8be76ee129b87572d84d9bbb82da2baefff78952b5883b7148080c88dc55165c86cd99d6d7a9054882a7276e415fbbad378b3b987ada6b91a8826adb438978fcd7970b34c3e4cee5ab6ef7c687260aaf1e43f920ba6b0cd40c180af4d1663cff289c6da0b74f5129e2a809f3ca9caf3b64f35951ea52952623970e0d99c7d07a5b09c104fb2c9d4fc6726f1d56271849bf5bd7eee227e49dccb4f7d63c86498ac59f3b51c8253efa6710dd7e051b0c327507bd5f4"}, 0xe3, 0x2) r4 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'vlan1\x00'}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYRES16=r1, @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000100", @ANYRES32=r5, @ANYRES16, @ANYRES32=r3, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x400}, 0x0) 01:59:16 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0prolvboxnet1&vmnet0\x00') 01:59:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200060086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x700000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200070086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 724.513571][T24377] cgroup: Unknown subsys name ''ppp0{wlan0prolvboxnet1&vmnet0' [ 724.535309][T24381] cgroup: Unknown subsys name ''ppp0{wlan0prolvboxnet1&vmnet0' 01:59:16 executing program 4: r0 = syz_open_procfs(0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_128={{}, "cc4c5e30a0b82d1b", "af899d1f9f24d7c6b0b257ae4de2ede6", "641faa73", "00fcfffe41488304"}, 0x28) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)={0x1060, 0x0, 0x5, 0x3, 0x0, 0x0, {0x0, 0x0, 0x2}, [{{0x254, 0x1, {{0x2, 0x7}, 0x0, 0x1, 0x6, 0x7f, 0xc, 'syz0\x00', "7aa4796b5a5bda4fe12a52c74c2b2698efb1a37abf3a9f1ca3769289e56e2950", "a3be1b72ff10e5fc983aa3bd42073fa82be8b7e7e8924cd2c59615652570192c", [{0xfff7, 0x8, {0x1, 0x8d9f}}, {0x4c00, 0x0, {0x2, 0x1}}, {0xb7, 0x81, {0x3, 0x4}}, {0xd48c, 0x401, {0x2, 0x9}}, {0xf001, 0x2, {0x0, 0x200}}, {0xfffd, 0x0, {0x1, 0xfffffff9}}, {0x3, 0x2, {0x2, 0x40}}, {0x35, 0x67, {0x1, 0x814}}, {0x6, 0x20, {0x3, 0x6}}, {0x8, 0xfffe, {0x3, 0x1}}, {0x4, 0x5, {0x3, 0x8001}}, {0x401, 0x8d08, {0x1, 0x1}}, {0x0, 0x2, {0x0, 0x5}}, {0x3f, 0x20, {0x0, 0xffffffa8}}, {0x5, 0x1, {0x0, 0x40}}, {0x4, 0x5, {0x2, 0x9}}, {0x10, 0x400, {0x1, 0x80000001}}, {0xfffa, 0x7fff, {0x1, 0x5}}, {0xbe4, 0x1cb3, {0x2, 0xda}}, {0x7f, 0x3ff, {0x0, 0x2}}, {0x2, 0x8, {0x1}}, {0x200, 0x1, {0x2, 0x8}}, {0xffff, 0x401, {0x0, 0x9}}, {0x401, 0x3, {0x2, 0x80000001}}, {0x6, 0xf801, {0x2, 0x40}}, {0x8, 0x1}, {0x3, 0x7f, {0x2, 0x7ff}}, {0x401, 0x80, {0x3, 0x6}}, {0x158, 0x6e34, {0x1, 0x20}}, {0x9, 0x800, {0x1, 0xa7}}, {0x9, 0x3, {0x0, 0x1}}, {0x4, 0xb3b3, {0x0, 0x7}}, {0x3f, 0x1000, {0x3, 0xd6}}, {0x4, 0x1ff, {0x0, 0x2}}, {0x89, 0x40, {0x0, 0xc6}}, {0x8, 0x2, {0x2, 0x6d2d}}, {0x5, 0x1ff, {0x2, 0x5}}, {0x2, 0x24, {0x0, 0x80000001}}, {0x3, 0x8e97, {0x2, 0x3}}, {0x101, 0x1ff, {0x3, 0x8}}]}}}, {{0x254, 0x1, {{0x3, 0x80000000}, 0x7, 0x7, 0xee33, 0x5, 0x10, 'syz0\x00', "1dfad79967addab10912c9f06c9f8f306beceae3f21f681324b78e1301f4d270", "d379576f39264307c0e708380e940a4bfe14c092a95e5f7c7b60acd5c909f719", [{0xfff, 0x4, {0x1, 0x1}}, {0x1f, 0x9, {0x2, 0x9}}, {0x6, 0x969, {0x1, 0xefa}}, {0xcb3, 0x7ff, {0x0, 0x6456}}, {0x6, 0x6e3c, {0x0, 0x8}}, {0x95, 0x0, {0x0, 0x80}}, {0x6, 0x20, {0x3, 0x4}}, {0x1, 0x6, {0x1, 0x3}}, {0x400, 0x8, {0x0, 0x6a1d}}, {0x3, 0x0, {0x2, 0x5}}, {0x4, 0x2, {0x0, 0x5}}, {0x611, 0x0, {0x1, 0x3}}, {0x3, 0x20, {0x3, 0x7e82}}, {0x0, 0x2, {0x1}}, {0x728d, 0x20, {0x1, 0x1}}, {0x3, 0x4, {0x0, 0x20}}, {0x2, 0x3, {0x1, 0x7}}, {0x1f, 0x35, {0x1, 0x1729}}, {0x7fff, 0x824, {0x3, 0x6}}, {0xe6, 0xf800, {0x2, 0xe4}}, {0x9, 0xfff, {0x1, 0x3}}, {0x9, 0x99c, {0x0, 0x3}}, {0x7ff, 0x0, {0x0, 0xfffffffc}}, {0x8000, 0x8000, {0x0, 0x7}}, {0x2, 0x0, {0x1, 0x20}}, {0x1c, 0x101, {0x1, 0x8}}, {0x5, 0x7, {0x0, 0x5}}, {0x1, 0x40, {0x1, 0x1ff}}, {0x2, 0x4, {0x0, 0x2}}, {0x8001, 0x4, {0x0, 0x7}}, {0xc945, 0x4c, {0x0, 0x5}}, {0x10a8, 0x5, {0x2, 0x42a98979}}, {0x800, 0x3, {0x1, 0x7}}, {0x5, 0x5, {0x1, 0x1}}, {0x5, 0x7fff, {0x0, 0xd5}}, {0xff, 0x1d, {0x0, 0x1}}, {0xc08, 0x1, {0x3, 0x40}}, {0xcc7e, 0x6, {0x3, 0x4}}, {0x4, 0x0, {0x0, 0x9}}, {0xffff, 0x1dc7, {0x3, 0x8}}]}}}, {{0x254, 0x1, {{0x0, 0xfffffbff}, 0x0, 0xcf, 0xff, 0x9, 0x1c, 'syz1\x00', "4b81fa7067f4186211ac0e5d3a85539f66bcc652be3ad52e1128867b567132f5", "4d137326a0eb4737f9ed6c1ed642c2eb8d7bb6fee80dd057409caed5b0b4f531", [{0x1a80, 0x0, {0x3, 0x3f}}, {0x6, 0x7, {0x1, 0x1}}, {0xa42, 0x9, {0x3, 0x3}}, {0x3ff, 0x7, {0x1, 0x200}}, {0x2, 0x8, {0x2, 0x9280}}, {0x80, 0x34b, {0x1, 0x328}}, {0x8, 0x94e, {0x2, 0x80000001}}, {0x100, 0x200, {0x0, 0x7f}}, {0x6, 0x6, {0x0, 0x800}}, {0x3f, 0x80, {0x0, 0x5}}, {0x1, 0x8, {0x0, 0xffff}}, {0x0, 0x401, {0x0, 0x100}}, {0x9, 0x2, {0x0, 0x80000000}}, {0x8, 0x8001, {0x1, 0x4}}, {0x8000, 0xfff9, {0x1, 0x2}}, {0x5, 0x1, {0x1, 0x8001}}, {0x4, 0xc2a, {0x3, 0x7}}, {0xe02, 0x7fff, {0x0, 0x2}}, {0x20, 0x1, {0x2, 0x4b}}, {0x8, 0xfffe, {0x0, 0x9}}, {0x3f, 0x200, {0x0, 0x7}}, {0x800, 0x1, {0x2, 0x9}}, {0x989, 0x1, {0x0, 0xfff}}, {0x8000, 0x3ff, {0x0, 0x4}}, {0x20, 0x8, {0x0, 0x6}}, {0xcb, 0x1000, {0x3, 0x7}}, {0x0, 0x1ff, {0x2, 0xfffffffa}}, {0x5, 0xfffa, {0x3, 0x10001}}, {0x0, 0x6, {0x1, 0x4}}, {0x0, 0x3, {0x0, 0x1}}, {0x1, 0xff, {0x2, 0x2}}, {0x2, 0x3f, {0x3, 0xfffffbff}}, {0xff, 0x2, {0x3, 0x92}}, {0x800, 0x5, {0x1, 0x80000001}}, {0x3, 0x3, {0x3, 0x3}}, {0x1, 0x6, {0x3, 0x20}}, {0x2, 0x4, {0x3, 0xe9}}, {0x6, 0x100, {0x0, 0x7}}, {0xfff, 0x9, {0x2}}, {0x3, 0x73b, {0x2, 0xf70}}]}}}, {{0x254, 0x1, {{0x1, 0x8}, 0x6, 0x9, 0x6, 0x8, 0xf, 'syz1\x00', "673d69a7dbd0a689bec817684445006a8cb3adf1ce70c82f0eea15fc2e70870e", "36cca1928231d57f0d4ba8bcbb427ab9b4846ae92980f6d92c449fc432a24475", [{0x3, 0x401, {0x1, 0xa47}}, {0xdb0, 0x5, {0x0, 0x1}}, {0x7, 0x3, {0x0, 0x5}}, {0x1, 0x5, {0x2, 0x7d4a95cd}}, {0x8001, 0x3, {0x1, 0xc34}}, {0xff, 0x40, {0x1, 0xf7}}, {0x1000, 0x3f, {0x2, 0x48}}, {0x5, 0xfff, {0x0, 0x7}}, {0x68, 0x4, {0x0, 0x3000000}}, {0x8000, 0x82, {0x0, 0x6}}, {0x9, 0x7ff, {0x2, 0x7fff}}, {0x200, 0x6, {0x2, 0x10000}}, {0xef5}, {0x8, 0x3b, {0x2, 0xffffffff}}, {0x0, 0x2, {0x0, 0xeb68}}, {0x1, 0x5, {0x3, 0x4}}, {0x3, 0x9, {0x0, 0x1}}, {0x36, 0xa4a, {0x3, 0x7}}, {0xfff, 0x0, {0x1, 0x5}}, {0x0, 0xfffb}, {0x2, 0x1, {0x2, 0x13}}, {0xc51f, 0xe89, {0x3, 0x101}}, {0x8, 0x5, {0x0, 0x4}}, {0x71, 0x3c, {0x2, 0x1}}, {0x8000, 0x6, {0x3, 0x1f}}, {0x1, 0x80, {0x3, 0xc89}}, {0xb8e, 0xff, {0x0, 0x400}}, {0x8, 0x540, {0x3, 0x3}}, {0x5, 0x7ff, {0x2, 0x8}}, {0x7, 0x6, {0x0, 0x1}}, {0x40, 0xff, {0x3, 0xffff}}, {0x0, 0x100, {0x0, 0x2}}, {0x9, 0x1, {0x2, 0x4}}, {0x8, 0xf800, {0x1, 0x4321}}, {0x3, 0x9153, {0x0, 0xfd4}}, {0xeca, 0xfffb, {0x2, 0x100}}, {0x9, 0x7f, {0x1, 0x3ff}}, {0xb8, 0x8001, {0x3}}, {0x91d0, 0x8, {0x1, 0x80000000}}, {0x7, 0x2, {0x1, 0x401}}]}}}, {{0x254, 0x1, {{0x0, 0x15}, 0x7f, 0x0, 0x9, 0x7, 0x4, 'syz1\x00', "974d5f6fb9855834bf77333435b49bc3ff3250c292ea65187e3806d5b506eebf", "4cd02d58a94e104fb7a78232af686c4040d18c6c7fcde7fc86effb69def6ed81", [{0x212, 0x2, {0x0, 0x5}}, {0x8000, 0x8, {0x0, 0x2}}, {0x4, 0x6, {0x2, 0x4}}, {0x8, 0x200, {0x0, 0x2f4}}, {0xfffc, 0x7f, {0x0, 0x3}}, {0x7, 0x5, {0x3, 0x100}}, {0x3, 0x3, {0x1, 0x5}}, {0x7, 0xfffc, {0x0, 0x5}}, {0x7ff, 0x9, {0x0, 0x133}}, {0x80, 0x8, {0x3, 0x9}}, {0x3, 0x4, {0x1, 0x934}}, {0x3, 0x3, {0x3, 0xffffffff}}, {0x770e, 0xa, {0x1, 0x7f}}, {0xff00, 0x6, {0x0, 0x71e2}}, {0xfffa, 0x800, {0x3, 0x191c}}, {0x9, 0x3, {0x0, 0x20}}, {0x0, 0x40, {0x1, 0x7}}, {0x3e1, 0x7, {0x0, 0x8}}, {0x5, 0x8, {0x2}}, {0x6, 0xafe0, {0x3, 0x8}}, {0x401, 0x5, {0x3}}, {0x3, 0x8, {0x2, 0x6}}, {0x20, 0x2, {0x3, 0xd8}}, {0x6, 0x5, {0x3, 0xffffff7b}}, {0x91c, 0x6, {0x0, 0x2}}, {0x1, 0x8, {0x2, 0x5}}, {0x6, 0x401, {0x0, 0x7}}, {0x7, 0x7, {0x1, 0xfffffffd}}, {0x3, 0xf8, {0x0, 0x7fff}}, {0x8, 0x9, {0x1, 0x42d3}}, {0x3, 0x9, {0x0, 0x4}}, {0xec9, 0x1, {0x3, 0x6}}, {0x3f, 0x303f, {0x0, 0x7}}, {0x1, 0xff, {0x1, 0x1}}, {0x8, 0x7ff, {0x1}}, {0x0, 0x200, {0x3, 0x9}}, {0x878, 0x5, {0x2, 0x7}}, {0x1, 0x9, {0x3, 0x4}}, {0xfffa, 0x7cad, {0x0, 0x5}}, {0x4, 0x8ba2, {0x3, 0x2}}]}}}, {{0x254, 0x1, {{0x1, 0x2}, 0x3f, 0xfb, 0x9213, 0x1, 0x14, 'syz0\x00', "1f618b9ddcf672cbe6dac7a8ff38c474ec6a4ef7a8cf9103864a9f73a03177e0", "d9c2dbcdca3b123fe36e266a88e1e19b85e24f6b8c271c42118b027d43dbc17a", [{0x7, 0x8, {0x2, 0x1}}, {0xdbeb, 0x7, {0x3, 0x20}}, {0x5, 0x8, {0x3, 0x9e1}}, {0xfff, 0x3, {0x1, 0x8}}, {0x7f, 0x6, {0x1, 0x242}}, {0x401, 0x1057, {0x1}}, {0x1, 0x40, {0x1, 0x315}}, {0x0, 0x101, {0x0, 0x181e995b}}, {0x7, 0x5, {0x3, 0xcc4}}, {0x80, 0x5, {0x3, 0x1f}}, {0x9, 0x400, {0x2}}, {0x8, 0x8001, {0x1, 0x7}}, {0x3, 0x0, {0x1, 0x1}}, {0x0, 0x65b, {0x3, 0x8}}, {0x1000, 0x3, {0x1, 0x8}}, {0x1000, 0x4, {0x2, 0x4}}, {0x800, 0x7, {0x1, 0x7f}}, {0x1, 0x8, {0x3, 0x3}}, {0x8, 0x0, {0x2}}, {0x8, 0x7, {0x1, 0x8}}, {0xffff, 0x401, {0x1, 0x3ff}}, {0x1f, 0x8000, {0x3, 0x3}}, {0xff7f, 0xa00, {0x0, 0x7f}}, {0x4, 0x0, {0x3, 0x7}}, {0x0, 0x8, {0x2, 0x2}}, {0x9, 0x1, {0x1, 0x3}}, {0xfffc, 0x0, {0x0, 0x30}}, {0x4, 0x7fff, {0x2, 0x5}}, {0x7, 0x1, {0x0, 0x5ea}}, {0xffff, 0x20, {0x2, 0xac9a}}, {0xc4da, 0x13, {0x0, 0x6}}, {0xd8c8, 0x4, {0x0, 0x1ff}}, {0x688, 0x1, {0x3, 0x6}}, {0xfffb, 0x7, {0x3, 0x1}}, {0xfc00, 0x81c, {0x1, 0x4}}, {0x80, 0x8, {0x2, 0x3f}}, {0x33, 0x8f87, {0x2, 0x20}}, {0x1ff, 0xffe1, {0x0, 0x17}}, {0x400, 0x8, {0x183c39c0b1bcb831, 0x1}}, {0x55a, 0x81, {0x2, 0x6}}]}}}, {{0x254, 0x1, {{0x3, 0x80000000}, 0x5, 0x3, 0x101, 0x0, 0x3, 'syz0\x00', "3540c84af53af8724748d7e13cbffa9c8077c7bcd1555a1c943be92aea3ef34d", "7991bb6f1493dc84def02fa20c9d6012f63aabf820c4fbb0161d441c52009a34", [{0xfd2c, 0x40, {0x1, 0x1f}}, {0x3, 0x1, {0x3, 0x1000}}, {0x0, 0x7fff, {0x1, 0x7}}, {0x5e, 0x2, {0x0, 0xb9}}, {0x400, 0x40, {0x3, 0x6}}, {0x7, 0x5, {0x6bf458125526184b, 0x9}}, {0x9, 0x8, {0x1, 0x2}}, {0x0, 0xff, {0x0, 0x101}}, {0xb4, 0xe4c, {0x0, 0x6}}, {0xfff9, 0x3dc, {0x2, 0x4}}, {0x1f, 0x3f, {0x2, 0xd091}}, {0x0, 0xfffd, {0x0, 0x177e}}, {0xfff, 0x4, {0x1, 0x7fffffff}}, {0x4, 0x0, {0x3, 0x8}}, {0x0, 0x98b3, {0x0, 0x10001}}, {0x1d00, 0x0, {0x2, 0x2290}}, {0xff, 0x6, {0x3, 0x3f}}, {0x80, 0x1000, {0x2, 0x9}}, {0x0, 0xffff, {0x3, 0x7ff}}, {0xb881, 0x5, {0x1, 0x1}}, {0x8000, 0x8000, {0x2, 0x1f9}}, {0x81, 0x0, {0x0, 0x3}}, {0x800, 0x40, {0x2, 0x4}}, {0x9, 0x9, {0x0, 0x3}}, {0x1, 0xc75, {0x0, 0x6}}, {0x5, 0x4, {0x1, 0x9}}, {0x8, 0x4, {0x0, 0x1}}, {0x8, 0x2, {0x0, 0xec}}, {0x401, 0x90a2, {0x3, 0x5768}}, {0xd95, 0x2, {0x2, 0x7}}, {0x3, 0x2, {0x1, 0x2}}, {0x2, 0x4c2e, {0x3, 0x10000}}, {0x400, 0x7, {0x2}}, {0x40, 0x0, {0x1, 0x2}}, {0xfa49, 0x2, {0x2, 0x9a5}}, {0x6, 0x8, {0x1, 0x1f}}, {0xd7, 0x4, {0x0, 0x4}}, {0x0, 0x81, {0x1, 0x4}}, {0x8001, 0x1b1, {0x2, 0x3}}, {0x7fff, 0x3, {0x0, 0x5b8}}]}}}]}, 0x1060}}, 0x80c0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r1, &(0x7f0000000280)={0x1a, 0x0, 0x7}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) sendmmsg(r1, &(0x7f00000001c0), 0x400000000000150, 0x0) r2 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@can, &(0x7f0000000080)=0x80, 0x80800) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f00000002c0)={0xfffffffffffffffd, 0x0, 0x0}, 0x0) r3 = socket(0x848000000015, 0x805, 0x0) connect$inet(r3, 0x0, 0x0) 01:59:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x800000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:16 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0proovboxnet1&vmnet0\x00') 01:59:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200080086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 724.818380][ T27] audit: type=1800 audit(1589767156.581:556): pid=24388 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16290 res=0 01:59:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x900000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 724.889305][T24394] cgroup: Unknown subsys name ''ppp0{wlan0proovboxnet1&vmnet0' 01:59:16 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x80001, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x15, &(0x7f0000000040)={'nat\x00', 0x2, [{}, {}]}, 0x48) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b", 0xe) r3 = socket(0x10, 0x2, 0x0) write(r3, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f0000000000)=0x6, 0x4) recvmmsg(r3, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$sock_inet_SIOCGIFDSTADDR(r4, 0x8917, &(0x7f0000000080)={'veth1_vlan\x00', {0x2, 0x4e20, @remote}}) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x23, 0x0, 0x0) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) dup(r8) ioctl$LOOP_CHANGE_FD(r8, 0x4c06, r0) 01:59:16 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0propvboxnet1&vmnet0\x00') 01:59:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200110086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 725.027103][T24405] __nla_validate_parse: 13 callbacks suppressed [ 725.027114][T24405] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 725.137457][T24409] cgroup: Unknown subsys name ''ppp0{wlan0propvboxnet1&vmnet0' [ 725.174456][T24415] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200300086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:17 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0prosvboxnet1&vmnet0\x00') 01:59:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xa00000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200600086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 725.435332][T24422] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 725.482925][T24423] cgroup: Unknown subsys name ''ppp0{wlan0prosvboxnet1&vmnet0' [ 725.499646][T24426] cgroup: Unknown subsys name ''ppp0{wlan0prosvboxnet1&vmnet0' [ 725.543038][T24429] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000386dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:17 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0prouvboxnet1&vmnet0\x00') 01:59:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xb00000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000586dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 725.794389][T24434] cgroup: Unknown subsys name ''ppp0{wlan0prouvboxnet1&vmnet0' [ 725.843759][T24440] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:17 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0proxvboxnet1&vmnet0\x00') [ 725.973557][T24444] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000cae71a20dd9bb4630000001800028014000100"/36, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 01:59:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xc00000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000686dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 726.109204][T24448] cgroup: Unknown subsys name ''ppp0{wlan0proxvboxnet1&vmnet0' [ 726.144764][T24450] cgroup: Unknown subsys name ''ppp0{wlan0proxvboxnet1&vmnet0' [ 726.221522][T24455] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 726.254756][T24456] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 01:59:18 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0proc\nboxnet1&vmnet0\x00') 01:59:18 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000786dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 726.304277][T24459] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 726.366382][T24456] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 726.398770][T24465] cgroup: Unknown subsys name ''ppp0{wlan0proc [ 726.398770][T24465] boxnet1&vmnet0' 01:59:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xe00000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:18 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200001186dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:18 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procv\noxnet1&vmnet0\x00') 01:59:18 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200002086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 726.659772][T24477] cgroup: Unknown subsys name ''ppp0{wlan0procv [ 726.659772][T24477] oxnet1&vmnet0' 01:59:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xf00000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:18 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procv%oxnet1&vmnet0\x00') 01:59:18 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200003086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 726.856143][T24487] cgroup: Unknown subsys name ''ppp0{wlan0procv%oxnet1&vmnet0' 01:59:18 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000580)={0x13, 0x10, 0x10f, {0x0, r6, 0x1000000}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r6, 0xf}}, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r7, &(0x7f0000000780)={0x0, 0x3, &(0x7f0000000740)={&(0x7f0000000000)={0x2c, r8, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_HEADER={0x3, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)={0xcc, r8, 0x280, 0x70bd27, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x98, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x94, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, ',^GPLGPL\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']lo\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x19, 0x2, 'cgroup&GPLvboxnet1,:\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, './cgroup.cpu/syz1\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}]}]}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x40}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x9}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20004840}, 0x20008041) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x5000000, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440009000e000a0010000000008000001201", 0x2e}], 0x8}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8}, 0x0, 0xe, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 01:59:18 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvb\nxnet1&vmnet0\x00') 01:59:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x1200000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:18 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200004086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 727.066497][T24500] cgroup: Unknown subsys name ''ppp0{wlan0procvb [ 727.066497][T24500] xnet1&vmnet0' [ 727.089015][T24498] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 727.089140][T24503] cgroup: Unknown subsys name ''ppp0{wlan0procvb [ 727.089140][T24503] xnet1&vmnet0' [ 727.120836][T24498] @þ: Device ipvlan1 is VLAN challenged and team device has VLAN set up 01:59:19 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200006086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x1400000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 727.195305][T24508] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 727.232036][T24508] @þ: Device ipvlan1 is VLAN challenged and team device has VLAN set up 01:59:19 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvb%xnet1&vmnet0\x00') 01:59:19 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c20000ff86dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:19 executing program 4: ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f0000000040)={0x2, 0x0, &(0x7f0000000000)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(0xffffffffffffffff, 0xc00464c9, &(0x7f0000000080)={r0}) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x4, 0x0) accept$inet(r1, &(0x7f0000000100)={0x2, 0x0, @initdev}, &(0x7f0000000140)=0x10) socket$inet_udp(0x2, 0x2, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x404000, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000200)=0x1, 0x4) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000240)) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0xc402c1, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f00000002c0)=r4, 0x12) r5 = mq_open(&(0x7f0000000300)='/dev/vcs#\x00', 0x800, 0x80, &(0x7f0000000340)={0x8, 0x4, 0xffffffffffffffff, 0x4}) fsetxattr$trusted_overlay_origin(r5, &(0x7f0000000380)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000400)={0x2, 0x4e20, @multicast1}, 0x10) prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x25) ioctl$SIOCPNGETOBJECT(r1, 0x89e0, &(0x7f0000000440)=0x100) r6 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000480)={{0x3, @default}, [@remote, @null, @null, @rose, @bcast, @null, @default]}, &(0x7f0000000500)=0x48, 0x80800) fsetxattr$security_ima(r6, &(0x7f0000000540)='security.ima\x00', &(0x7f0000000580)=@v1={0x2, "8ec1670328641eb6ecb1"}, 0xb, 0x3) [ 727.436833][T24516] cgroup: Unknown subsys name ''ppp0{wlan0procvb%xnet1&vmnet0' 01:59:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x1500000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:19 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvb\\xnet1&vmnet0\x00') 01:59:19 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000005dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 727.669059][T24530] cgroup: Unknown subsys name ''ppp0{wlan0procvb\xnet1&vmnet0' 01:59:19 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000386dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:19 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvbo\nnet1&vmnet0\x00') 01:59:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x1600000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:19 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000586dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 727.877441][T24541] cgroup: Unknown subsys name ''ppp0{wlan0procvbo [ 727.877441][T24541] net1&vmnet0' [ 727.907735][T24544] cgroup: Unknown subsys name ''ppp0{wlan0procvbo [ 727.907735][T24544] net1&vmnet0' 01:59:19 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvbo%net1&vmnet0\x00') 01:59:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x1800000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:19 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000686dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 728.139724][T24552] cgroup: Unknown subsys name ''ppp0{wlan0procvbo%net1&vmnet0' [ 728.162577][T24556] cgroup: Unknown subsys name ''ppp0{wlan0procvbo%net1&vmnet0' 01:59:20 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000786dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:20 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvbox\net1&vmnet0\x00') 01:59:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x1900000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:20 executing program 4: mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./file1\x00', &(0x7f0000000200)='exfat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) ioctl$TIOCGPTPEER(r2, 0x5441, 0x3ff) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r4, 0x0, 0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)=r4) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0x0) shmctl$IPC_RMID(r3, 0x0) shmctl$IPC_STAT(r3, 0x2, &(0x7f0000000a00)=""/4096) 01:59:20 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000886dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 728.415279][T24564] cgroup: Unknown subsys name ''ppp0{wlan0procvbox [ 728.415279][T24564] et1&vmnet0' [ 728.428737][ T2660] print_req_error: 144 callbacks suppressed [ 728.428755][ T2660] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 728.454592][T24570] exFAT-fs (loop4): unable to read boot sector 01:59:20 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvbox%et1&vmnet0\x00') 01:59:20 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200001186dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 728.519552][T24570] exFAT-fs (loop4): failed to recognize exfat type 01:59:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x2000000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 728.659034][T24578] cgroup: Unknown subsys name ''ppp0{wlan0procvbox%et1&vmnet0' [ 728.693158][T24582] cgroup: Unknown subsys name ''ppp0{wlan0procvbox%et1&vmnet0' 01:59:20 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxn\nt1&vmnet0\x00') 01:59:20 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200003086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 728.874972][T24589] cgroup: Unknown subsys name ''ppp0{wlan0procvboxn [ 728.874972][T24589] t1&vmnet0' [ 728.903829][T24595] cgroup: Unknown subsys name ''ppp0{wlan0procvboxn [ 728.903829][T24595] t1&vmnet0' 01:59:20 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200006086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x3f00000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:20 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxn%t1&vmnet0\x00') 01:59:20 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000005dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 729.193792][T24606] cgroup: Unknown subsys name ''ppp0{wlan0procvboxn%t1&vmnet0' 01:59:21 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxn\\t1&vmnet0\x00') 01:59:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x4000000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:21 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd600bf52600081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 729.393380][T24614] cgroup: Unknown subsys name ''ppp0{wlan0procvboxn\t1&vmnet0' [ 729.408638][T24617] cgroup: Unknown subsys name ''ppp0{wlan0procvboxn\t1&vmnet0' 01:59:21 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f50b00081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:21 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnwt1&vmnet0\x00') 01:59:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x47efff7f00000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:21 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600031100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 729.619669][T24626] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnwt1&vmnet0' [ 729.643943][T24630] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnwt1&vmnet0' 01:59:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x4800000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:21 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxne\n1&vmnet0\x00') 01:59:21 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600051100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 729.866671][T24639] cgroup: Unknown subsys name ''ppp0{wlan0procvboxne [ 729.866671][T24639] 1&vmnet0' [ 729.884993][T24641] cgroup: Unknown subsys name ''ppp0{wlan0procvboxne [ 729.884993][T24641] 1&vmnet0' 01:59:21 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxne%1&vmnet0\x00') 01:59:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x48efff7f00000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:21 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600061100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 730.105087][T24649] __nla_validate_parse: 28 callbacks suppressed [ 730.105098][T24649] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 730.152673][T24652] cgroup: Unknown subsys name ''ppp0{wlan0procvboxne%1&vmnet0' [ 730.169040][T24655] cgroup: Unknown subsys name ''ppp0{wlan0procvboxne%1&vmnet0' 01:59:22 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600071100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 730.233409][T24658] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:22 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxne\\1&vmnet0\x00') 01:59:22 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52603081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x4c00000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 730.352291][T24662] cgroup: Unknown subsys name ''ppp0{wlan0procvboxne\1&vmnet0' [ 730.368203][T24664] cgroup: Unknown subsys name ''ppp0{wlan0procvboxne\1&vmnet0' 01:59:22 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet\n&vmnet0\x00') [ 730.474985][T24668] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:22 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52605081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 730.581258][T24671] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 730.609789][T24672] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet [ 730.609789][T24672] &vmnet0' [ 730.632546][T24677] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet [ 730.632546][T24677] &vmnet0' 01:59:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x6000000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:22 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52606081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:22 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet<&vmnet0\x00') [ 730.784225][T24681] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x80000000, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r3 = pidfd_getfd(0xffffffffffffffff, r2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$smc(&(0x7f00000009c0)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r4, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a00)={0x14, r5, 0x721}, 0x14}}, 0x0) sendmsg$SMC_PNETID_ADD(r3, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000007c0)={&(0x7f0000000700)={0x8c, r5, 0x400, 0x70bd26, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'macsec0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_team\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4}, 0x40010) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030400306c08600000000000fff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x306c, 0x4000002, 0x0, 0x2ff) [ 730.862944][T24686] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 730.874211][T24685] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet<&vmnet0' [ 730.889920][T24689] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet<&vmnet0' 01:59:22 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52607081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:22 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnetT&vmnet0\x00') 01:59:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x6403000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 731.102619][T24699] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnetT&vmnet0' [ 731.124178][T24701] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnetT&vmnet0' 01:59:22 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52608081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 731.146770][T24703] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 731.221902][T24707] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:23 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52611081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:23 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1\nvmnet0\x00') 01:59:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x6800000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:23 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52630081100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 731.448746][T24713] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1 [ 731.448746][T24713] vmnet0' [ 731.465277][T24715] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1 [ 731.465277][T24715] vmnet0' [ 731.476322][T24717] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:23 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet10x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000001c0)={r4}, 0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=r4, &(0x7f0000000040)=0x4) mkdir(&(0x7f0000000080)='./file0\x00', 0x23e8e184bdce7e5d) lsetxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)=@random={'user.', '\t\x00'}, 0x0, 0x0, 0x0) 01:59:23 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1Tvmnet0\x00') 01:59:23 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f526003f1100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x7400000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x81, @dev={0xfe, 0x80, [], 0x25}, 0x2}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 731.984397][T24739] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1Tvmnet0' [ 732.005459][T24742] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1Tvmnet0' 01:59:23 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&\nmnet0\x00') 01:59:23 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600021100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x7a00000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600031100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 732.272868][T24754] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1& [ 732.272868][T24754] mnet0' [ 732.290260][T24758] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1& [ 732.290260][T24758] mnet0' 01:59:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600041100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x7d00000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:24 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&v\nnet0\x00') 01:59:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600051100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 732.574819][T24769] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&v [ 732.574819][T24769] net0' [ 732.624561][T24772] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&v [ 732.624561][T24772] net0' 01:59:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x8500000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:24 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&v%net0\x00') 01:59:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600061100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 732.863425][T24780] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&v%net0' [ 732.885874][T24784] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&v%net0' 01:59:24 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x0, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) io_setup(0x9, &(0x7f0000000000)) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 01:59:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x9effffff00000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:24 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vm\net0\x00') 01:59:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600071100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:25 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600091100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 733.256801][T24799] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vm [ 733.256801][T24799] et0' 01:59:25 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vm%et0\x00') 01:59:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xa500000000000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x17, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYRESHEX=r1, @ANYRESOCT], 0x88}}, 0x800) 01:59:25 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600080400fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 733.468483][T24810] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vm%et0' [ 733.495197][T24815] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vm%et0' 01:59:25 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmn\nt0\x00') 01:59:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x400, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') r6 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=ANY=[@ANYBLOB="5800000024000b0f000000000000000000000000f08b94e0de259fb4197014db98494e12aaf9ca0a76fa88fca3483b77db7306d8be8d8a49762a32330afb1c221642d187177761373b46c70118c886023705814720", @ANYRES32, @ANYBLOB], 0x58}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000003c0), &(0x7f0000000400)=0x30) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, 0x0, &(0x7f0000000300)) sendmsg$NL80211_CMD_SET_MPATH(r3, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)={0x54, r5, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0xffffffffffffffff}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xfe8, 0x2}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @multicast}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_MAC={0xa}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x4040840) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000240)="450f29f566b89d000f00d0c481a1ec41d466ba4200b84d000000ef430f792e2e420f01c1b988090000b800300000ba000000000f30650fc75e19c744240003000000c7442402c9a322a2c7442406000000000f011c24b9f8020000b8d1000000ba000000000f30", 0x67}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') ioctl$KVM_RUN(r4, 0xae80, 0x0) 01:59:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xf0ffffff00000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:25 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600080600fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 733.707281][T24825] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmn [ 733.707281][T24825] t0' 01:59:25 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmn%t0\x00') 01:59:25 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600080b00fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xf5ffffff00000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 733.970802][T24839] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmn%t0' [ 733.973320][T24841] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmn%t0' 01:59:25 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600082100fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:25 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmn\\t0\x00') 01:59:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xfeffffff00000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:26 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600082900fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 734.217882][T24852] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmn\t0' [ 734.245193][T24855] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmn\t0' 01:59:26 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnwt0\x00') 01:59:26 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600082b00fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 734.497977][T24864] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnwt0' [ 734.516586][T24868] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnwt0' 01:59:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f0000000180)={r6, r7/1000+10000}, 0x10) r8 = dup3(r5, r4, 0x0) dup(r8) ioctl$DRM_IOCTL_AGP_ALLOC(r8, 0xc0206434, &(0x7f0000000080)={0xa053, 0x0, 0x0, 0xe67f}) ioctl$DRM_IOCTL_AGP_FREE(r3, 0x40206435, &(0x7f00000000c0)={0xffffffff, r9, 0x10000, 0x81}) io_setup(0x2, &(0x7f0000000140)=0x0) r11 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2) io_submit(r10, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x6, 0x0, r11, 0x0}]) 01:59:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xffffff7f00000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:27 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmne\n0\x00') 01:59:27 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600082c00fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 736.146869][T24891] __nla_validate_parse: 20 callbacks suppressed [ 736.146880][T24891] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 736.184374][T24890] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmne [ 736.184374][T24890] 0' 01:59:28 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600082f00fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:28 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmne%0\x00') 01:59:28 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="341c50d02316609b563e00ecd4112d0100", @ANYRES16, @ANYBLOB="00012dbd7000fbdbdf251a000000050092000300000008009a000000000008009a000000000008009a0001000000"], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x20004080) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x411, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6841}}, 0x20}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x42208000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x2000c000) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r3}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0x5ee, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 736.259076][T24894] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:28 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600083300fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:28 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0xcc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) shmget(0x1, 0x4000, 0x1000, &(0x7f000096d000/0x4000)=nil) uselib(0x0) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x6777dd2c59b255af, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000080)={0x7, 0x6d, 0x4001}, 0xca) gettid() getpid() set_mempolicy(0x8003, &(0x7f0000000300), 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000240)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200088}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x400, 0x2013322, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc080}, 0x80) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r2, 0x40045010, &(0x7f0000000040)) 01:59:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0xfffffffffffff000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 736.416658][T24902] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmne%0' [ 736.420685][T24901] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 736.449332][T24905] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmne%0' 01:59:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) write$P9_RUNLINKAT(r3, &(0x7f00000000c0)={0x7, 0x4d, 0x1}, 0x7) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000140)=0x6) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r4) ioctl$DRM_IOCTL_GET_STATS(r4, 0x80f86406, &(0x7f0000000180)=""/43) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000000)) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1, 0x10012, r6, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) r9 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r9, 0x40086607, &(0x7f0000000100)=0x5) ioctl$sock_inet_SIOCSIFPFLAGS(r8, 0x8934, &(0x7f0000000040)={'veth1_to_hsr\x00', 0x103}) write$binfmt_script(r7, &(0x7f0000000000)=ANY=[], 0x8) getsockopt$netlink(r5, 0x10e, 0xa, 0x0, &(0x7f0000001000)) 01:59:28 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmne\\0\x00') [ 736.604919][T24915] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:28 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600083a00fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 736.741829][T24921] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:28 executing program 4: mount$overlay(0x400000, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="8e6f7765726469722c77a865850ee0944fae837240cccf5e54dba35f592927eb8ca526b962eb592130701b86e4fe9d77e8e0420f4d24e068b8e1c851141fea798e854190f2326443d43faf52ab1dd0195001bd4dd8e1e346ec990dc90f7be25c4eb90cf1c9a6f92a6f4fadb52adb3a3ba47114c256ffeeca544875b539df20a2a328c83f317faf43685a39d54b95571da9f139a2b621fc76383c92594ff530fff9d19cd16d36750026909712fff9008f71c2bb17a5d081b3239c4c93b2bb18685b00"]) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) io_submit(0x0, 0x6, &(0x7f0000000c80)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0xdb00, r0, &(0x7f0000000600)="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", 0xfe, 0x8}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0xab21, 0xffffffffffffffff, &(0x7f0000000400)="4ce313dc67bef6e89cb095ba8b3da1763674daa02c0bdfaea7e9810f077139a480b99cacd4b584f3f7df1363aa74a7819f6b97cf81e4dc3729509406f35d005123d9d4aca95ad7ef8291eb489a7e01132c7f0d60125a3fa0f615db0c2ddbfca10655be608a3eb9889a54bf1db88a8f8a603dc0662ab0289d4e103d0d8109039f", 0x80, 0x25, 0x0, 0x2}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000800)="fc3c2cf1837afe833d5348d43cac323865a135351a50759a02437f6083e2e5878863fb61bca8c32ecaa4bb5d42d2e60f78f10428d7c4a2", 0x37, 0x80000001}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x6, r1, &(0x7f00000009c0)="ff6f3cc221caf6fac9a117c153d8e638ac2399c81731958cdd1c1b324d5503c71c023e2185bf0027d5197293e83fcb01cd37a1f489af600b38c2cb6895ce33729c3204fc0bb184cd06f40d2ca3bfc8fb2172b81710b0a505e169e22000539989642174d4a632cdc3f97d793e7e555aa8b5be61df1b255cbdf66c7b8a0166318551b2b4299bcf046a022eef860cc759823f532dea17850f4f47494c5c4f32172f986b5a", 0xa3, 0x4, 0x0, 0x1, r0}, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x8, 0x8, r0, &(0x7f0000000a80)="725c5f6b39da8f493885bb11ee48e9b3c03d5983a52098dca7fefd07f2ab3eee1f4a82c1b965489892a97a7178ee39c44e773b09ec177b777ff193abdb7d16eefaea1af0a1bd6938d9dcdd98ab7fd7619a3a3b7d898d3c73e35919bfa111375c9802b4fe97de4de90aa8589c9b202a9e1a9779d1a7f71c7d0b6ed0f99d244012c071c39cb0b98904ae68a7338a86852e4a816a486ecc549fd04a2840cd455e88f7ef1d00f3990b835d0cd5321bb74013ee226ca6f89a1352d4644dda29e6b86d880a36669b3eb179ce26b81c92ece5f8cc2ee4dcecf98623541872db7f5bc0cd89fc38efee", 0xe5, 0x3, 0x0, 0x2}, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x2, 0x7, r2, &(0x7f0000000bc0)="65ef64664ec0b0a530648cc0b43ba542c8e9cdafb224d2bfd4cf11854fa51e88aa935974a6447d196caf74f05df88733c213621bf199185c4ec4790d34c6bb8c4b17ca338ff0f68c4be03a4960eb575846a9ca0514220e71571e46c6b17d838ab860cfd3e2edf0", 0x67, 0x107, 0x0, 0x2, r0}]) chdir(&(0x7f0000000140)='./bus\x00') add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz'}, 0x0, 0x0, r4) r6 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r5) r7 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r7, r6, r7}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r8, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) dup3(r8, 0xffffffffffffffff, 0x80000) keyctl$dh_compute(0x17, &(0x7f0000000280)={0x0, r3, r7}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)={'sha3-224-generic\x00'}}) 01:59:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 736.843591][T24924] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmne\0' 01:59:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000000)={0x4, 0x0, {0x53, 0x0, 0x4, {0x3, 0x1f}, {}, @cond=[{0x0, 0x0, 0x1}, {0x7, 0x81, 0x105, 0x81, 0x1}]}, {0x0, 0x0, 0x0, {0x8002, 0x821}, {0x9, 0x8000}, @const={0x6, {0x3, 0xce7, 0x8000, 0x1}}}}) pipe(0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xc, &(0x7f0000000300), 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) dup(r1) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x34, 0x3e9, 0x800, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x40, 0x9, 0x80000001, 0x0, 0x2}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x4080844) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x4) sendfile(r3, r2, 0x0, 0x800000080004103) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f0000000180)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:59:28 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600083b00fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:28 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet\n\x00') 01:59:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r2, 0x0, &(0x7f0000000480), 0x1}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r6, 0x80585414, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f3, &(0x7f0000000300)='gre0\x00') [ 737.032400][T24938] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:28 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe900, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xe00) 01:59:28 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600083c00fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 737.131540][T24941] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 737.169712][T24944] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet [ 737.169712][T24944] ' [ 737.196707][T24941] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:29 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet#\x00') 01:59:29 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) open(0x0, 0x8060, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f0000000080)) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r6}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x801, 0xffffff9e, 0x0, {}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 01:59:29 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600088800fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x2}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:29 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f00000002c0)={{0x1, 0x54}, 'port1\x00', 0x10, 0x800, 0x0, 0x7, 0x800, 0x8, 0x80000001, 0x0, 0x3a8000a86d695c58, 0x6}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) getpid() r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000093000000e271c2941231320eeea91d980da7ef5c98738e02b229b4d69e4e9a92b9254fa461d829bf97afcf88047225de41b8d6b24ac0428f380000f335e0f19621e9fed76e8beb49dea0ff4878b9faaa8831406ad3aaf1b1e3fdbcd5803b6e9c2e336940390014909c500ee07ff25244c19bcd7cdee5d7c59ecad4be350a2786bb1f69aa4586897a148716527d4a48b19eeac21eca4db9"], &(0x7f0000000240)=0xb7) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r6, 0x800fe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x10000200) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r7, 0x800fe) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) [ 737.456246][T24960] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet#' [ 737.483424][T24965] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet#' [ 737.528774][T24967] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:29 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081103fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) syz_open_pts(r1, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0xf, 0x2, 0x9}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x3, 0x6, @broadcast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmmsg$nfc_llcp(r8, &(0x7f000000a0c0)=[{&(0x7f0000000300)={0x27, 0x0, 0x0, 0x3, 0xff, 0x5, "f3ccb1b2d7456af9739d8aba8210353a83b94289bb231b40d68234d32f3c2b5fbd311ec77de3fca929eb0553e6e54bfc44401c7db79b81858aee5e74c25b9c", 0x18}, 0x60, &(0x7f00000000c0)=[{&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="3a09e2c710890c23e6a9384695b24df564661a761f901c93bdda522015de9a5604e5971c05534c6b3fc87f93d1f5a2ef65790d50b1fb13556964e3011d5325df164450c5fb0c5e8f0a638b0dfce6726e1f7fc68b5e25b005b4348ba4291ee10cffeadee8992690917644d4f87736045fded969cff58f7e865e0f30aab2182ec0c368752cea84b25e01607f3a3cb4eaf0425610808a2bafb1814709fb5c683a60d7f29ebf407108d053b78649ea180246a80a0bb8", 0xb4}, {&(0x7f0000001440)="faf8d215df05654b973ebeb4e4076cf15ddbf8ab7135ef64be623df11a1c4d3740c5adb355060e5241951401964be2cfce8751cb8779e77d32d3f81099e92973d93ed8e9bcdc6db38ea84b87b5dff4e57aee91868066083f16f879a7c1d9096e6332c22c4a471b6b5875928f", 0x6c}, {&(0x7f00000014c0)="aed69e5769fd1b08ce22e1da85a8672ed5e4704a7f1c2edeef1eb6b55e9f87336c5ff56b5b80e3391c5cff9aa471b7f55aeabfa81391c6e1393740f99cd6e15a11cf1ecb1449d578c34274dae6dc4769b20ba2f2e892e0856f187b537e009bb3e5939d4e1cab214ce3e9370d9dd33e48ec0b03470dceabfb6e45ead0ecf1e28f129887660fd1a2a5", 0x88}], 0x4, &(0x7f0000001580)={0x1010, 0x104, 0x5, "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"}, 0x1010, 0x80}, {&(0x7f00000025c0)={0x27, 0x1, 0x1, 0x1, 0x2, 0xff, "a7400477a5c708fdc5c8fa1fac6cd604203e401c63568283b39275bcf39b0407c7004a67519ac5092217a21daebaef4e5054273508d8e38b87cb3f9aee8010", 0x2d}, 0x60, &(0x7f0000000280)=[{&(0x7f0000002640)="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", 0x1000}, {&(0x7f0000003640)="cdcbda4c06d6bc240596141e66658d2b4deeb7e19581635725644b318337f9a35e72232c62e8977285cd719821460c391e775f8b48be92bd5661b9c28c197993d1d61c77179a2dcbe0066e9cd8e8bd5d10ffdd5b151bf80d0190568a4ff14bc4f9f72fec64d3414f6e9cb286db8ef20d34a867caf5afc719352c9ac1c5e4b38695160406ae19d76949aaee1abf92c51e5f4a7227c4aaf680a34fccda67", 0x9d}, {&(0x7f0000003700)="fae9967a6e8c2254ee67429a0d8aecd7199676dc3bb2a6bb592c25dc0fd211db68770619bf816efc327e784f377b29b8ddc6f9fa6f919975caf6ebc59b51c1d263306c9dd3b00578593d", 0x4a}, {&(0x7f0000000140)="8dc1b06a", 0x4}], 0x4, &(0x7f0000003780)={0xe0, 0x10a, 0x3f, "57065a68e46b3303b556fc101a9cfc75e00c5ce3986f696b22d0672a279aa18f06c3fd1436e84c0d0c9a0a4f8885add3c11a9576b4f5b7f296d4c400944969f0e4fadc8edb9fc3f8952afbda8049ac05a07aa596fd6074b401bcd14195227cd6e7ccc73b96a2db54a5c64d44a9e7bcac96e9e1c165c83c6ea5e91038e91722e50f5e6eb33e92ced9be9ef3daa7a993a227dbf84e1488ed31e3fe5e54294b89b57967dd87d01397497cc095e765c3be630e3d2c1359d2cef41fe8ad44c477f6510a976a6b9ae99652cd1311"}, 0xe0, 0x4008000}, {&(0x7f0000003880)={0x27, 0x0, 0x1, 0x3, 0x1, 0x4d, "3db040cb1ab079014f5f8f6c57ea9263d4c2fa16ef0da24ad29e85aa4ef903f45a856a336fff792b3b57b90fed9434d2939d6dc9b97db0d876b549fae46308", 0x7}, 0x60, &(0x7f00000039c0)=[{&(0x7f0000003900)="085d0f9751b449d36b55f19dd41c99ba98d1efa8fab0a723d683a9d01805327909117fc8e1e1600a080c0e244d60aef3725ba95a30245c0387bdf9fcfd258b2f2057b567c0232774fef86f66afb6b812e96dfb2d1108e6c57845399deb0ba54a0c162036560e835d056d19772d141e62bc9a3420526a0385b3fe34614ab1b087f9aed377110abf94fbf86930274e7b84301bad9cda51e3f7eb971c7b0d1b842f2cab96b8a29b8498a5739d2507", 0xad}], 0x1, 0x0, 0x0, 0x10}, {&(0x7f0000003a00)={0x27, 0x0, 0x0, 0x4, 0x5, 0x5, "8f66bc1cb288f4105e9e3bc09c95706fea4bc5c7beb5d7d143b07ea395943120f121f682fd389d436963a913deebf5823e88d49d25926b8f32c18a41e8a919", 0x36}, 0x60, &(0x7f0000003ec0)=[{&(0x7f0000003a80)="3f3f6921c3f8", 0x6}, {&(0x7f0000003ac0)="b76b20eaba911d2612cd83599a0475b4a37aa07fc103db40f782b773eff2c4200956df159898c0f5bab52afbd7ff14c6c3a11a94f5d0db63b875e32a021ea9e8f0b28db3dbdb783fb06b9851c008f303a46c3ec7d2e2b49bb90873f5844b42377962f3673dc72f23704e7bd4557c0bb4329b8d4a0df21d59327ae38545f8258fca4ad4726730135698", 0x89}, {&(0x7f0000003b80)="10597606a9c1c5b8cd6ff4fc1ffdfb20211731", 0x13}, {&(0x7f0000003bc0)="fa57b563ddb9e30267d0f902aaba026108a9555cec6d6d2b15bb504854fe5d40a73f5735632a189f58e5d89124e880a5e06c52ae040ff2be9ac2825c35984b279b4351b39b5f9abaad4cde8fcfc684def0ad1b083411e9d15501040a0f68888f6c1f5c90acd8dec41470bdfb7fa40f219f90ea33bd597ecbdd71edcfd6085110445afd71db51f6407d9bd7f839e3580c01a6a31f2452a3c313399229b35e992ff60c32caec741d5046d3d3fcce500cc636", 0xb1}, {&(0x7f0000003c80)="e1abb9ba7c1819a1e9540dad794ceb2043638e2b631c4fb46f9f3b0020ed633aecba5290a5313c169f32293093fdb1bca8d66b1be7dfb257000c54428f0d10523bb8a1a45be54a6767fa63af2edf30fa83125edb982f40748135b2e6b02fb8ff148d40ddb03a470b0d6a4efe5972da7daa67f29d47c2572a9937f549d8c4bb6451e859444aee9d7b2ca98126197e925aad1a5dce1b3afd5e844f293642148bb8c989b4b78658bd99ad3d6cac26d5874df03292c7d911906ac72b1a11847c7efacc6d757335835a08c14762c5f970d49ab261ee13fcfd630fc659068aae87c3601bef30e13600da60ccd608eb7791d865a9663b4c", 0xf4}, {&(0x7f0000003d80)="26ef48b4c97ee56e38092cde3e133e5e1c8685bb2cb1f0c8a21bf3793c13161c8f558dceae2d3b4fc7603ae6469f530f13d578f61a16b9862330a7707c8b7d3150dc63d443c589cd8c20604c4f46eafd5b3ff1bfe2f56be98991ec233af51bee3e6a0b66a27601c1e4963d1ad1d01d7a83acfb97a54eedf6e72385dcbcb106b753bf3f05dc486664f8d7dce2d5228cbb7db96381cabc3ff4cfbbe92d1e585b471481d66b46dfe6ed8656cd1858ee3d512e8bb801238ef7786871ad8b1b877f5b6853b09e75557c3173ba5e5ea7822959e468256cc151dbb2e224e40ccd580d147ff141ec43", 0xe5}, {&(0x7f0000003e80)="d9aaa41f88d57f5998a81180a1ceff3a5ec0b5a9de2e148faa2651b5f998", 0x1e}], 0x7, &(0x7f0000003f40)=ANY=[@ANYBLOB="e800000000000000010100000100000020e9da751a10e7f1f2afd13addc196a75bbd9b2485fb99bf57ae01e5f397a79d12082aad2b19577b64e2764b48f62d84f7c0b9d8aa76d36b83b61da6e4ae7692cb50f753ba003db1922319e7ccac4bb7f5197a60ca344aa6a0520fbdd89278b9e0ee6121054825687eed20d1ea22e7fcb793b228e3a2751582edee1c5786e86f98d9f9230dce43f8cab5d5e3bc890ea511d7cc912f875c8e8904a2c2af0ee4859a2510e17198b4a8b0882fb2d3633d9eb15346f78df6b18b3c56cf8a68d2a2bef7e72ffadcdbadfba56ada53f31b5e6e44860c3f04ca7e29"], 0xe8, 0x44000000}, {&(0x7f0000004040)={0x27, 0x1, 0x2, 0x4, 0x4, 0x20, "20df8a3f085a11a2de4b5c20a9895c9d67d54187865a267509d9fb24235ba0cb9236d6e6e9acbb541110ab4c9e314b9acb8bc81b4a39b264bdd6171fff19fc", 0x14}, 0x60, &(0x7f0000005180)=[{&(0x7f00000040c0)="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", 0x1000}, {&(0x7f00000050c0)="5b45a14094d686e7561106747c48cb1ef68b2cd994ca716fce5731c5894170d3e491024bf454224ebe54159c7e64dd3cf5746bdbbc3127abf59b32a23d6fc2b568a6c15f93bffd162f1ad98ce34c724494b4f6311db4893a18a7461e8a3b756175cd7063ef4157880d379b26f3a662e8768f174e3d1d92132dfd0f5f033bb8a0113ecbf5d8b61660d02d218c49684a78ac7401", 0x93}], 0x2, &(0x7f00000051c0)={0x1010, 0x105, 0x0, "ed20e9d2dbf03f5ed2d06a5e2a5ec41fde841ae5bfd9aacc74645292397c95fc1e09e1f515a6babee5fe3c690fb4093a52c6ea755287bad330924fea3d637135e5f50c1a4be462fc8360a2bfc889cd7cbafd28d0ede7a04323aa7374d8db328d44129467bcc0e9bcf912e0e29ddc35c15e61b1cad609b41fb4b814d9a0049fb5481afa129d17e354b662cbdc350e8249614ab951d4609acdcc857b2252229afe1e7a34fe4ee8c03d86b05b0c64ea53182d8e25aef47c08e62595c1eaef4c11c5758efa32d1c208d68748df70f08f20b7f4d42e9b33bd9d96f625f797c8b82c6f167a9ed802cd077902ece9f804069414ec8302c52b5472e84e6c2b0c5a82042c68d9ef3aa3905bcd6b5e360cc67704889cfb12cf55734e5264223743bfc6ff620614d1fae171d9429658b406df7dd7a1496d6575a47accba6b91100728054d8cebe00bf0d35527f17a436f43d27b0410a5c6f809ae54c63170680165f318ab5451c1da4bf6bf1676bd945156c59da084cab496228edeadee54d29ab2b17e34e3351b6365fa113ecec1e837242b3f30f10e9edc34ecca77c970eba3e3917a8908d8b8bc828886f3ec4aa4a7a216d92f9dd4db210bc0599f1aa799509b0a9387e77372306543ca02f03d369b3666371830bc00bad4c79c3377a4de79a4fa3200f49b86d77a8f88dfec544b3b94152c9669658ae67a9434f4b26e9e1f8b3573c94a7d93456259ea5189176846b7f0a6f449c01ccf2157581a96e612a5559602ed65fd6a6c76be97cad75f9bbe5e376529e8d8962b1f38fe04ec70936814091a3578b387395a4e5a912d8a98b29c509050c6385fe28d93cc0e633cf024aea508b2f1308f99d4f9eeb29802dac72cc4b83789d86ba79a25a08c8adb10268bd25a99bf8dabaaabc9499d92ec913ca966bbb887a92090b6edb4e46e6011d274879d7415e71ab828194fc6fb2913aa6b6d5ff743060189aa6929ca1797be187f7d486774af6942decbaa16982c887bee774055e648253d066ff8eab6a8520f3b3b05ec614bb71258ebabf1eada70bbafb37c7c613f55d8abda2a55ac71cf6e8eb6b02ab5e39988346354717b63caaa8476898cf6d9a24239de61d1771ed9523504026c6ad7bb4fa1e35f2ea1dec58296e4b7b9e23a2c069f335c2dc1fc5733861764d53f62776e2eed407807d9598c6d1a9d2f22fcb54d65afc042df99b5a50d1e54bdb89f2899861eef9979c272fdeb26a9914eed435eee47484117ba3a1e86f2c41a3e9ea966880bfee322e390160508aafce22df3214e2695030824fc9864afb447a368b511640b14a55fb2cf55a4ef8cad1adce024677cdf8137642b799d8318b34805e14d7f697fa088abe815de1d1ecd3129468bd1bc78986b6bc73b2d6cac238b01ac8a3717adc6ac9ee0773b7a6bf7fbff28ecff22637461d57d534d293c85541afbd76132ce16a05119728468e64dff9004a4488e026f1815b465b417fd71ff6909088604e1520fadba10b96d1c32296a928f173e17d7d280586a7dc9e4ab556911a796281349810d38eb49b3adcd3ac948f10362e2f3e7a5f8e5c2e1e4e8acb64117a650004a5947e06d95b4139d7dd56f4af1de39857f8b68c793ee140f8eb95aba1d86121fa1b3799855eb1cacf3d5cac99e870fea53b64ba420203e22af6a664d6fa9b7c28ea1d698e8f5ff7a80034a43a5301978e24fd67dfbada17edeaa75b41d562f7783122b573d56bba28cb3ac7b721ff50a7b99d173e739b6dd5bddd4f2551a590b85fca771a1e82433cdac916277ecfc1b26bd7154fed8ef80df16b850054fe85e9e7580e9c0ac20808b55a3a5418afde5ad5e6a98f0cdcf5bfd69d3e270f2a49b9ca190a2ddf56ce3b925a70f777eef97fa61bdf54bbf5a7d7ee07dea7ac22f01b1423c071df94546ebaa41bd81c07dc0ba517bc6a2f9de62b0d4527d5458d45e56b24f7c5c4c6ddac14ff87bf608217868339a157297217d753924112d510dda63450efeac4ba8f649bbbff9ee7ab3d41cf9e600afb9c05b0e6a44f9b7df0017c3ad42b8bfbd4f601e65b7cbfc30eb975c4446e4b73cb2b819a89cd16194ca933a554cc2a4a53ef06b220864fc66974632be30b14a0170fa40361a3586700317ed0bb0d77c9235990a4efe2218ea1e612f82940c20562fc89c82bdf56e8b915bcdf61315448b85095cbf3a20cde4d01fc3caee1e6dd95f68856ca2230fc12a8691967348b60e9b018544f4a49fe88a100663dcbd0e8918f7e466afdf2724449b36dad8f870b6b6557da6cc7d0cdd3791d62e9689315a7f9a61e682a3f050d61d11d3c3002e8947def2b4789a0c57c7ed730a18049359bd6d44ca577e80d75a3126234353828eca4ae807c93b4f4428e05bbcb08bc791f7fd605b62552201c335e155e52fb35c86fb25575c475c99d2e8bcbc930599a3a5fb16607d5d1bfd7a45df3cb2dc99cada308d89f28eb09b194a1ea21ce0b0b8b4cdaac5dc26ea0f8639f9ac56859d66ad63cf0a00b9bd965b57ce38b0d0f7bab5e403719c6eccd0adac02061b7d0220d0b0cbe7c56225880473aba4740ec3e60964b4d1745876fc5c5432ee212b74297bec1c32e8144304cba51f620a5b816cecf6de593649bff8f4100caed47ea633bde5a375c827cb24406b59a72fd7d06036956c35f6d1ccf53cd5065618573652da0af0058cc42ded35847c7b6cb3cefee54447c597e98db1f2648e03acf5f9003d7792ebdacefc6f6e5592e3198e12dc0c482a66f143fe7f46d92397c3ce850dd8e2a8a118e4169fc27e865c1c882892be36cf77d4b09f30f7289a0c38ef51067e674b0fdc73653d76e37879522474ba484f69b19a20dfbd757d8f2ca1c92c58affe8869bfcaa09de3a232dfac063e5ec2bcce1303b798beae1e0411f1708e461ad44abb3c999fb7680af149ebd2bab4d8ea5868b827f7ef1b3ec8f76618b401d67586bc3670bf0e438f1262a06b2de423bb2237686f85461cb9b1cf3986edb606f745dd7c4f34dd5a2492a1bbf5d4d6fc5a68616b36b25d7f0e626dbd7363566a9355a755c3b69d15009ff574853095bb607792289c855873c71befc423c269ff6a883c6a37d118c1f8c76bc1bb7f12f721dd42ca02f3410ba5306bdc8944c93289eff7e4fe2135111c08ba21f52804a739c92a450834ecbdd3524a5d4a117070b1eb4812e008671d6a33b310cc490e73c231a28d5c4ac06e9c07bcccd5b23e04315732ede965079ed13940b7695a23560f59ebbfe1cc63d3c5f8170f6062c559e7132a5b5f516aa66adb98168a1334423134c71857971afd4747a325849d95e565734bf668c2103939e1e5d817d068cf803b62e2208045473c3b69e73dd2da48f3c622f02505e09debf1629f3140a29b0a68e14b4820e28a5d2aad1ebd15a586c7412dc390bfb6d02ab2d67b80596cbb1e65c900ccc013f247eec120e8aeab82d8935fa76ca151fe9329254b458fae5fddc4bf86292fc628cda79ce967ee3df89b97a569952633ad644d5f43ade97b5f9fbfe5c9b0f35e0a177320115747030e973f56ee72f56a71394fbffe2b48f7b4b87783319f91facbab6ee0a90acc868506ad0b718accb9150080204adfb2bf872f974876eb69abe1c168fd0e3c763305feb172cfd5818ee25922149f38f221fb295fe8dbfb904993417713876790929b8d40113a7e940dfd76c099c7993ee6e44e170d6cd526388ec96682af04707f6758eafa2d83be64e8791ce76f269b94961707cada89e4b4ffa2fce2d22d775b76e5c5a47bea0088ec7ba71580d972ed8fde30f954ba80daf5992219ee308230e241da9b3abfda03a205a98e2d4dcdd267a40ffbce2db2bd0aaf6263ab38fc96a5a4bb400eba078aeaba6f6291be3dea9760fc02dc1bf3a5420fd10ad2a604540eb44715a9804e095eaa0ce8a641ed0263852a68f274ca69318c2913e2c09448623df4e1ba03b753f293172f9b281dc4a86248780d65ccd75f456c5ca98fa8e54976277b4698207ac8e97b8af236401e6ccf29f67a03c23f6134a47f5eb1a863d2e77171c8e362adb4c6f487dfd1750454cc30ce6d853e02aa04328d6f7ad843173b8104f7d1ddc409c70a1eeb0a27c68ec143aadcf9e79129e0912b47d2ecf47caa42622a2bf38a1eda3b126de661ba8dabaddefc1204fdcf341ecc9a1d6e5752032a266216cbba14d67ffb30bf9851b11da4bdbbba042240de6f91ccff2816c52ec70021d40d50a9fc120294ecdb98a00e8606882e9d92e714688e20a663c3b2d88ec0939bd2c4d0f4e54d8b2c13bf72737e47e16a9341504d6c2dd155ed6fdaf6e5d2d493c5c8fc5bb17459726ff42526fd7a0beac9df219a3000968a6616604008b10e3499793caca4af09930b0784095cf02c3af72b913c0a8ce139394fb6ac251768706d3378b1f4a2aaa7a95d1b4a6aa3105ade2e5922a69d92ac57fa0b02d8a159393f54032a247d6c21396072af84f8f0607dbe8672c5185a623d2dc43f33127f5e87c9eb4cf430643af3e81edb921e5dba7486cc95eec379fe78fc47cdbce75c9020027490cde566d80453a6691096fc884f5a847a582f00a03e00aa9b18d141791fec9c5cc6deb86794bf2dccf8a18905880cf2a5dfe42f0c47527e65b201f188b6890e8e2ae8679294f2a2e2d2e37b1476c85df20dd47d0d5cf5014c0fb806bc6d3646fadc997b9f275413eaf2b3ff8651cf785fbf5dac56081598e0670b351374b49a90fdc1bfd475fd765c43e5cd01d9db890db677560de71abccb1e06707b4356d69e24b0cece3c9dd5e114188b33d99fc0a1c5d6623fef0b9a102b25a7c8aed1c2705242c6b070005d537be60725119e997087ce0d150682d6992bcb9110da46a701fcb74f9b80aafced36ad16429de9fe8fcb53e20c9dc6cf904c5b02c068284dc01dce94ee03cdc9779c2a6d9b93cb07a71d3c5f3f1b1c8f276e0868d94d58228e9844392766cdc1ed45f5cb280a49cd2d880db0a55c1069702f23cc7c90a7e72db74ccb91c6d5fe2b43ae14f68686bd2c5bc506d5eae6f5cd0935f947ce8a9edded3e93165f0e12a50aca730bdfad14b58ca999a4b5ec83daea13870dd6facc8a61534988efa8231fe7f03ad2a55cc8021f1d68229727d6051dd680a0c5a9d06f5b41a469cd5a8e3a12007003bc94a442ccf605bb3d1694bab3e8ab51fcd6fa71161f48d1331532988b370f71a7cf6bf271e9cc2cc6d0406604891aa09f4d4a3e1f9062181d8b8b338a5805883c6c82b18eddf189ea375622059e1d8476169af23176fb8b6ab9103a335db6e0efc14bf45eb07aebe90ecfa119f564acef96f52c248a5e999f8ecb13205e68e597d3cbe7a7f3a676552b0df500c55352f2f595c15eec48a48d7aecfc8e8dde41035c3dd5f0304a438e0ea3ba13a03f35f9fa168b12c29d0a299050066305bd49a15204f70cedded21709a92b774b4393f87b0ada9445102e63e3b97c7c7319101ac99fab6f906091db6e0ed520d979f15cb3ebf3ea86b0fd153a0aa9e898eaf768239cde44d84f015ecea79df319bdde3a038e80dc47952d105100876db36ffd207435b9cfc37651e6ccf699a3c14a8425416068b430bd422a3d2d834bd28bf47b285b00b5759e4a33d956aa39fad449de120ba7625dac2d27c0186a3a91d2f72336b85fc993b6eb9605ca3c5fdb2564b1b1319d362460ebeb46614a88201b754a89067cfb329f641c7528f7deb16f432b3fd5c79ff68e2720521943a21608f13bf084611540f9e66b5c0a3857904e4669511d5ba4851e4d1057853fe5"}, 0x1010, 0x20000804}, {&(0x7f0000006200)={0x27, 0x0, 0x0, 0x2, 0x1, 0x3, "a9b701f757f73a222766d999528435d0ff771ae046b8f15c9ae40a0713dee2dfb98107018a1cd7efae0f7173b16767249c8b4eb91a2975eb4a19932ceb9bf5", 0x20}, 0x60, &(0x7f0000008580)=[{&(0x7f0000006280)="8ade94f0e0ee447f851c52556a01424b5acb72509d4b98b64259de6ca4c11469aaa9fe90dd8355d89d6718e944bb7acc53e6e2cecd1ea7ce7f1265e900c99d56736e4ccd331ca3a386035127bc2cac66d4a3c0bac394c7260d5e4bbcefa8a8b24fe439acb0aef163a59080795e76741ee1c09b7e07d6e3b6d710cb639f7c973e960e703d07b5457b0c1e70085be0f99f35492c2c69f52dc6be260ba048f2cbd81d77b176de6caa8890e2bc6b71accdf7b5739466447187077f30ea77e82acae1767d8af406f5d7e887427db0350994adf3c36ac9fa8ea5f30856fc852a34", 0xde}, {&(0x7f0000006380)="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", 0x1000}, {&(0x7f0000007380)="725b8412c44c", 0x6}, {&(0x7f00000073c0)="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", 0x1000}, {&(0x7f00000083c0)="7f7e07a17afe29ca8806659438e1e8929355923bc39f0a047f6b639ac7eee4d9e6a62e0d282148e66a0a1bc6eaec1ceb4f1ec1216f28ced3c2852d45086e37f2c560d10c162445f0281422a72f6651d28e705eca48ecfd7eb95841a155bf965fb49cef4b1b99fb062050", 0x6a}, {&(0x7f0000008440)="b13d9c48a9415093af2c7a13dc9bb0df6f99aca5a1bd28cd5513e760922efa748c1c4792418dac7aee7a26bee3507622f5cb47a7eafe911bd4fd7cf9c5796d996bcddfe38900e7e054f76e7fdea68b991fcb09a4458a2a89f981d6ba10f1d019362b05ea1afee57c9323f5db792fd88254efead620e274f4a782d504838a6f67b30f128cbc1310", 0x87}, {&(0x7f0000008500)="135dad7ba0a6a4693a31f03c8b3c60bbb59f47c08f31abeb5d5bbaa26904cf85dabb6226b79802ecfbe13efcbf85b8c2daac62f2aec9cc781e625aaa", 0x3c}, {&(0x7f0000008540)="7f6525226405b5", 0x7}], 0x8, &(0x7f0000008600)={0x20, 0x10d, 0x0, "e8f07d7884014f9a1456c84fbc3567"}, 0x20, 0x32e6ccab57280c2}, {&(0x7f0000008640)={0x27, 0x1, 0x0, 0x6, 0x7f, 0xf8, "591934e0b97afa5c0ee79586fcfc9e63bfe873130b5206eac62b88878354d6d06fbafe1d0ff0ec58b4deb5bf5f83e233b4c6caf20ecc46721c323750b6246a", 0x1c}, 0x60, &(0x7f0000008c00)=[{&(0x7f00000086c0)="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", 0xfb}, {&(0x7f00000087c0)="0b183958a08103f169354f251a464ae3a7dd764eaad9dacf5783872f31a8f11e52ab41492501f7563574592f09e22db8a29de4dd1c1d0f496bac24480891a238ef21dba9cfb9eefe912426ed1bccae241e084483d7ca173436c82433b12760523f", 0x61}, {&(0x7f0000008840)="1f33e8dd6ed6b7543ed95daa7250", 0xe}, {&(0x7f0000008880)="583b53b01eb3d254f54bfa30deb9b3afa2e4d44d6d2a5b0fdfa4b2ccb69295c3a799e4d2b71f61b0d607cddd1e83e874f10120d601e14b3b700abaa14c54422195a5f8ca9fe61e23e936bc068a357725ea0a0aa48e8633dc9de67b32175768a57013fb6413a383a7943f76c896a7c941fca7ba2cd346744dcaa5afd9", 0x7c}, {&(0x7f0000008900)="7c2b77feb08858728917970cfa893d561428c8a82e8d970fab9175c2be23182bd7e7275c0a9d1608a014a259ca3d63724b493d99b8cb9692823792b84ada33c59efbd2661134916920f53ae196575c4460fe51c30f369f33154f04bf6b277191ce3972e6b06e942be86ac55e205ad683adc7b2010ec0580ffc0224f7ac2881470b01dc40ef0c9e0bd57c8d7f6892892b3ea3ce1c31513c46e271106f59e1e8f93314c83b", 0xa4}, {&(0x7f00000089c0)="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", 0xfe}, {&(0x7f0000008ac0)="d785a90091348ab7b321125a5f414419c3d077c6becc5487803892f35d2495d4e4f7cb5b65e0404bf8e9159883899463961f13c2888010cbd4e146a0f3749727ef4224a3", 0x44}, {&(0x7f0000008b40)="66f1d168d1d54dcff1316cceac168dfff02af9c86f1800f584130705efc0c8fa37ca3d50febf1f668f8420bf3db87ca2237737d4bdc8cf0c902f207d6beb9d3c731fbd61a56b9732eb270e61ef250b6a4a944c187ccd7592c8a9c2b347bedd4fd66b43481ce2d607", 0x68}, {&(0x7f0000008bc0)="912ee6380a08fbe39ab19180104c376fe72408", 0x13}], 0x9, &(0x7f0000008cc0)={0xd0, 0x101, 0x8, "a6f06f33f0d057f9392e3579320835c3138b18a99f0af4c99a204fd51b2872c04aa66b52d6b311a21b69694647b15d9e28e4cb877990d0a49a11fd70688ab094dc44152703c559f12507c2c9f46c2c84882e98209450014f333aa1b3b53391d709ee7884e6284c4cd42a04a521956adf249f7c5412ab4e6fa2fd77f22fba7a9800b17d845a529c7aba0c8328d444f144da21567cc643204ee88fc8d13bbd8bfe307d7122ec8dfb6ff4e9233ee4dc29f8d458e1a707f94816680c95839bc802ba"}, 0xd0}, {&(0x7f0000008dc0)={0x27, 0x0, 0x1, 0x3, 0x7f, 0x81, "5982b58b069300863736e91d577080ba8fe91b9ce4ee0c839fffc6fa0d9ccf4fe95507fc309e8a3e65e02f6d477cb4a471d814097412f300459b478b71423b", 0x20}, 0x60, &(0x7f000000a040)=[{&(0x7f0000008e40)="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", 0x1000}, {&(0x7f0000009e40)="3988b153e47a6c15a32bebb22b283e827a3ed9b4608d21a165365ccc779e52f2d1c9124788ccb3e2f8dd30aa9ae2d3dd9ff3e7f18d167e054a6e89bd21f33d7d69e3c1bc85f91480ad3af6a87befc69fc3e8308f2cf4e6fcbb7ab28c4b44d2799862cab8762780eb3521825b1e2c112d8276f0bf118d466a6d1fddafd54b1def0d29f765a95de5e10a1da5b932aa92be370569bd157fe1b1338ecfbc3937617e657232cabe0bf027d18c5b362387f6556455a7cd67d4c0d853f7aabba5c87af45aec569384cfcfb77201de", 0xcb}, {&(0x7f0000009f40)="db90bcec31b0f925d2a42ef050b5a73a67740aa7ba67c3fdbe0a86334a88221bd02ab524f822616ee8753778e64edcb274bf912d305c1e5a8a1e197694913f62f77ba56327a0db6ba2cf72917d2bcb6c6ed3b448fa5198da7a8f13f9dbad6f6288c441f69c68b33cb8b4a10022d2422c8995fb4923b07a3b850f67fcdabdc27755a934acb203b7721629228610df157cbe6766456b80d60b452a2c40523985c56faf6acd87392f6a7ad3bfbc8ebeb335c5589318f68e6d14ae7a7dde467ff1b49faadab0d11fa3e09ec822ad18fdcc127f69f7e6d0825447b66464cb2039e7228b605ecbc5395031f7631b7ccb5ab623bb", 0xf1}], 0x3, &(0x7f000000a080)={0x38, 0x101, 0x1, "37be35940e65604f5d873e2e4a60a27b82a6fe702780470ab940961544e49a6481"}, 0x38, 0x4040880}], 0x8, 0x40) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr=' \x01\x00'}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_LIMIT={0x5, 0x6, 0x3}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_LIMIT={0x5, 0x6, 0x7f}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x9c}}, 0x800) r10 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$CAPI_NCCI_OPENCOUNT(r11, 0x80044326, &(0x7f000000a280)=0x3) 01:59:29 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet%\x00') [ 737.616128][T24959] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 737.651774][T24968] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 737.733899][T24959] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 01:59:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, {0x2, 0x4e20, @private=0xa010101}, 0x106, 0x0, 0x0, 0x0, 0x9, &(0x7f00000001c0)='veth0_to_bridge\x00', 0x7, 0x2, 0x80}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff1d004000632177fbac14140de934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2000, 0x0) getsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, &(0x7f00000000c0), &(0x7f0000000180)=0x4) [ 737.778174][T24959] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 01:59:29 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081105fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 737.846943][T24975] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet%' 01:59:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x3}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:29 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet+\x00') 01:59:29 executing program 2: setrlimit(0xc, &(0x7f0000000080)={0x1002000000000002, 0x8}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x220800, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000240)={'raw\x00', 0xc3, "7f841fc9f96d911b200841c3e908980184ac76a9fa077d178a84e65c35fe0d109726bfc9a703ade480eeb2b0fe6b5f21a719862fdffaaa59773c8a45989fc0f271f03a00c59640bb67ccbc995c66294187f67d23b4e844fb3bde3a17c6da43264685c7d6ba300125cf3520c0f3bf68361d5697e472a843247a96aaf3257ac87707ec553a37374a005f6eb24d6ac2bf69277133e5ad23c45acb946e1101a49ef703b7566c73132f752369b797f6da47cf7faa5b9fd9f2fdcc4b47678f2b2678589112b9"}, &(0x7f0000000140)=0xe7) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x3, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f00000000c0)=@req={0x1, 0x4, 0x2, 0x10000}, 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000040)="d353ff072d68b2e4dc14aa5f7e25908384") [ 738.192177][T24989] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet+' [ 738.215748][T24992] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet+' [ 738.275702][T24994] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 738.317701][T24994] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 738.348379][T24994] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 01:59:30 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet-\x00') 01:59:30 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081106fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x4}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:30 executing program 2: syz_emit_ethernet(0x56, &(0x7f00000005c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x3, 0xa}]}}}}}}}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) 01:59:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) dup(r5) ioctl$EVIOCGKEYCODE_V2(r5, 0x80284504, &(0x7f00000000c0)=""/216) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) sched_setparam(r2, &(0x7f0000000080)=0x9) setgid(r1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000001040)=@raw={'raw\x00', 0x3c1, 0x3, 0x330, 0x178, 0x0, 0x0, 0x0, 0x0, 0x260, 0x240, 0x240, 0x260, 0x240, 0x3, 0x0, {[{{@ipv6={@local, @private1, [], [], 'veth0_to_hsr\x00', 'veth1_vlan\x00'}, 0x0, 0x130, 0x178, 0x0, {}, [@common=@unspec=@quota={{0x38, 'quota\x00'}, {0x2}}, @common=@inet=@set3={{0x50, 'set\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "8ed2a7dc17053eccb0dbe944e0b4d231b59a6f146ddc4e9bd200"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x390) [ 738.625343][T25003] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet-' [ 738.661982][T25010] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet-' 01:59:30 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x1c5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pwritev(0xffffffffffffffff, &(0x7f0000001540)=[{0x0}, {0x0}, {&(0x7f00000002c0)}, {&(0x7f0000000440)="03e95f7a9b4e2ca74299fc29b6d8fec2cc0ece624241dd71a0e6266c5165e93966189fd0bc169b7abc9b091ba48deb7c57107962e07e965b6d6baed2834b6190b2b1a18c2ee9494616a60d9bd2312471da7108d79d00c1f2f429e76e3c895550942232ee2508fa1bcaf358f3aecafd2e6386e7933cfb4d6f57ac9645ad836f6b01fd1d42b2bec7", 0x87}, {&(0x7f0000000340)}, {0x0}, {&(0x7f0000001500)}], 0x7, 0x5) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r4 = fcntl$getown(r0, 0x9) ptrace$setsig(0x4203, r4, 0x0, &(0x7f0000000080)={0xe, 0x1, 0x49d3}) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000001680)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x34, 0x4, 0x8, 0x201, 0x0, 0x0, {0x1, 0x0, 0xa}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x201}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @fccp}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) 01:59:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x2, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000000080000000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000b00010067726574617000001400020008000100", @ANYRES32=r3, @ANYBLOB="08b1e35bbbffffff08000a00", @ANYRES32=r3], 0x4c}}, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001580)='/dev/dlm-monitor\x00', 0x80, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001600)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r4, &(0x7f0000001900)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001640)={0x254, r5, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1f}]}, @TIPC_NLA_LINK={0x8c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1926}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6eb}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0xc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x130, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x45}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffff000}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x331}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc699}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x254}, 0x1, 0x0, 0x0, 0x4008004}, 0x40010) r6 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r10}}, 0x20}}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) 01:59:30 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081107fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:30 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet<\x00') 01:59:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x5}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:30 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081108fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 738.964977][T25024] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet<' [ 738.996524][T25027] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet<' 01:59:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x46010380) 01:59:30 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnetT\x00') 01:59:30 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081111fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x6}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:31 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081130fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 739.293296][T25038] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnetT' [ 739.320503][T25040] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnetT' 01:59:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = socket$nl_route(0x10, 0x3, 0x0) fchdir(r2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x6, @loopback, 0xfffffffd}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200002) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendfile(r0, r3, 0x0, 0x80001d00c0d0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SG_GET_REQUEST_TABLE(r7, 0x2286, &(0x7f0000000180)) 01:59:31 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081160fe7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:31 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet\\\x00') [ 739.555331][T25052] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet\' 01:59:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x7}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:31 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet]\x00') 01:59:31 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100ff7e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 739.844345][T25065] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet]' [ 739.860866][T25068] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet]' 01:59:31 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe3e00ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x8}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:31 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x02') 01:59:31 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e03ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 740.108451][T25076] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 740.141767][T25081] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:31 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e05ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:31 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r3, 0x8982, &(0x7f0000000140)={0x1, 'syzkaller1\x00', {}, 0x7ff}) r4 = socket(0x10, 0x3, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000880)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x411, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x6841}}, 0x20}}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8010}, 0x40) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000b0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100636273001c000200180001"], 0x48}}, 0x0) sendmmsg$sock(r1, &(0x7f0000006740)=[{{&(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x3, 0x4, 0x0, 0x1, {0xa, 0x4e23, 0x40, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000001}}}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000000a40)="44b7f14fe753b3f2505edb0018fb1dce1587394f71c12d059464a4905f75fe78e6fde073293961004313c45e989298a52bb7fb8caf78e0fd7d377f9d680175e5955865826affa791b246b227e7556af859e4b74a02459ae2ed6eb90596a5d2e068e7513a49cde8f462c1661a4cf6e9be62fc477125d7e4e0510231bcce26832e165dd04caed262", 0x87}, {&(0x7f0000000b00)="1c3302a11ba4b0f7bd866dd960627d8e52a4ea06c2b4a0177b4d16a54afc3f841f693d7e4e7712c156fbdfecfefdef9f589a5bef1b7ce8305c74f9e4f1c70e0b4ed1f4a742", 0x45}, {&(0x7f0000000b80)="ef3e38235066cfc03213db1b83380a8246536dc9ebfc8dae6ba5933eccf33537509110f37ce9224c644fdb246496d3d7b133e92a0104396d04c6862f4c5b2bbe9560b76866daefc42dc4ae581d97f2b107796be253ef8148b7b990453bba69fad555dd20ab3be9541cede0251259126668e346c736dde3e55017a005060a286473b143e752f58d98ec958b96f4f00e8653be50301b764a6b1cc1901e1d", 0x9d}, {&(0x7f0000000c40)="2637c1db1aec5e39043974613c99056056f20fdc4fa83cdb47e92d8051ed907834c5c0232edca9601649bcc152fcfe4264ad7f9da587d14e3c53b048c0774273e8d6c9ebaad3272e86dace14afd070bb28875d6d28f78ab2edd8badc57751f6bb1243604c543fbeb0c9f854a97a9037797788bf1b1ca3d3ed4a589969a59014fc801b95ea7c0ec1e87b9526e4a8a5015649e2194a9ae15147ec444245c8b4677d06ee49a3dff2b25187ec1b98acc785d299e59d640de774eb885254d98494975b241ec6dd3726ffad7984fb0", 0xcc}, {&(0x7f0000000d40)="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", 0x1000}, {&(0x7f0000001d40)="78ed07be799fcdb6ac42e809e77e9eee7fdbbc85c71ea3b2a73aa2b73703ba304aac05a617d89bcf837385df98bf31d6b66292103cb12766b3e3c88075dd820c330a0d5f2ce3127281b36b288754474043a72203e80eecc29013712c70c5ab68cbe71976be9b0bb59dd08347799467202fa7cd41917a5644ae1da94eab3ba3ba19f3e239734b70b64e9fd00b2b311db1c1933136c378754916b0913031ba471594a8f6738f2f68a1da14b0e40b616c458024d663b7d60add9f8034eeaabde0c6b1f56e76181c6ad232ab348de970060e8d18aee23a", 0xd5}, {&(0x7f0000001e40)="fff87fbb8a1d2388fe3ed5c3e3ab6f4399528e59f18be71e0f7606abd9beae63f7dbbe71265648890c6871876c5b9bbe48207c0f2d0e69b5941a74278adb784917ba017a9808e31918ef006ff0a913a587484ab8fbfd08c62772efed0328163a741676d40029820162676cd6ae", 0x6d}, {&(0x7f0000001ec0)="03d65bfcb409d8dea0dbf2dd37cb4b1367aa848369d6c57f7c854d4715eec9ca0e34088eb6e804a18d0b53863c6bffcfcaefeda3bb02efeb2efbc16170d37c78be8900c593133586abbab372f156cd819f37a5d2dd045e275710346dfb0936ed75a05543751247708c83e081ae9795cd6d4f599410035303a8960c838eef21cf16f5007ea07d145a37c21f26c9232bbf5f8570adc87f4574ca2e3099541a5f06b041361171fa4596b746db30da0d5530571c0b6c3f942fe0aeedf3b9f76863b2f09f23d2b176296107f21b700e8780899ce6f0d30d49907d9e253c0ce94a79cc", 0xe0}], 0x8, &(0x7f0000002040)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}], 0x48}}, {{&(0x7f00000020c0)=@l2={0x1f, 0xffff, @none, 0x9}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000002140)="92e0972f9d3b9b2074fc31de51cba7996c7c0482f85550b46c0207c4455b390a1565b9a17104b0eb409170184f4d93b16b5ed83a834250ce8663ecd8a54ec00bfd139839305b860976a2151f6891b91adf5503c94e340a602c272445a2ce79131c7be8ccc700e7ccc509207a1257a5fa9e1cb94d339df196d329772482ab75d8", 0x80}, {&(0x7f00000021c0)="33d0ecc044abb944372e4d1afb93713ada795e2f919bdfe5300608fb64f411ca6375b7417268ccb810da3eadba6b5f42ae2f45070016ceabdaaf058551aa9002460233258ecd90913ddb567669338d785ab235d173d94313581e964c07769eaeb878c4c46a0723a23fec9b3c53f0e9837052f15c786393fbedf4ef706f2a3787cd1903312441f74e023cd92916eced7c5678bdb7ab4e8365e6726c40cf2447f54d99b257ca4d74e521dc355ba9fabe785e28b94e69e63d99373fc23c81b4947413af99b824ceafe6ed3b0dba96b9b8da783d06b683bd7f7bf4bf43839651aba11631f8b9", 0xe4}], 0x2, &(0x7f0000002300)=[@timestamping={{0x14, 0x1, 0x25, 0x80000001}}], 0x18}}, {{&(0x7f0000002340)=@ethernet={0x306, @remote}, 0x80, &(0x7f0000003640)=[{&(0x7f00000023c0)="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", 0x1000}, {&(0x7f00000033c0)="f7a89eb985c7e64f6a7027bda9a4fb273683b202df11ef2d9c4733c72966af0324053ce67cc7f460a8e7c347af1c4f26b100ccc6c8a8a73a9d05ff5e22cc7557bfa4a870d597c2149b2c37817233278eb0a403ab4765aecf681744", 0x5b}, {&(0x7f0000003440)="c4bdd5764d68184eaffe7bb35deeb40d266c8c776c9587965206ad66eff19dfc08ef15ed8827028a3bdcf0fa6c4a30e71aa47eb19e5abb2e1b5f182efe02bd532129072b", 0x44}, {&(0x7f00000034c0)='d\'', 0x2}, {&(0x7f0000003500)="8ef88d01d31927dce1ca71e702b42fc6cb44aa0ccdef0538e2481d31d5bae688b33f0d2f551fac4cc1b874c9c14d5c80ce7e7082f3097b0f8aaf57a6ea0495ac03bde3ed8a0bfe5490d676e38882acbe2caa16313c57f75515fe68a83dd9692b5522914b90f8c52ac8179936e1b61d", 0x6f}, {&(0x7f0000003580)="2f4fd1d23ee8fd936bb33411d7d3ba7b37a00513474d3cba554b9831eadf050b3b32a2822ab44448cab2aaa973e0e208f8fa62450a7293e42babe609806bd3689f850687da9e4a9fcde975714861cfc700a2cd7f30c24e2b0171e56e0e58fd0fa43b4410f199f59d20a47412604d65bb5fe9ccb4bb6603fcb805466056d5f96b3be33c614c2a4387b5335b6544b5b8e225e01034ba1325a9d9fab1907a9d8cb2453fce38cf2a6ddf9d", 0xa9}], 0x6, &(0x7f00000036c0)=[@txtime={{0x18, 0x1, 0x3d, 0x7ff}}], 0x18}}, {{&(0x7f0000003700)=@isdn={0x22, 0x1, 0x5, 0x7}, 0x80, &(0x7f0000004dc0)=[{&(0x7f0000003780)="d203f6509fc56f57256df6eed07c380e2dcff70a029796f88b7955741a9534afca445ed81c4aff46bfc2015c997d31bac5c3c5a78c282e8aec7426b7a6f1289c5a665ac0dd83cdb2b4d35f018ec7d2f701a0ed1f912eb072e5d1372bf0bc5e1d7b596aa02bc8bdf4f3d185a93cac0c6793243d327e5559eea82c18ac12fa517aa7297c0d9bac3c0b8ca02ab1bd1711b97c28f92dafa6f2846da8cbf2f6d1", 0x9e}, {&(0x7f0000003840)="a0ad2bf462f511be60bd45c7df12175fac8887d4408b5864d7d8937b1ae28d8d566c9e6372ed064fd58aec6402c47d8814f227ea9de6aa087c3df788f82c44d88c41bf6bab5aaf3bbff575ef6fcc85832aff4f1ad02bec1a9dd8b6e6113f48bbf1e35b6dcc860d352a32225c35b2529dd5c04971c9cc9afd64705a15ab0ea89c265df9de1cbf73d956eb3d77cfc4fb7a0fee6aa60c50382808e033325464b96d04d0f5fdacd57b4ba5e9ef78f34da86bd8d7ddb3e7fedc3c642a06eb935c7efbbf83dba99c2d0502bb481ab473681c4a256f", 0xd2}, {&(0x7f0000003940)="c0130af23a2ee7161537bcb6b689c2771b84b6bfc54f8dc9175c645058cbde6eeb2509200bdee5cfeee473f8609933c3ee3fc127fe168b28bc6d5bdddbdfce778daa55062a6ff07153f2f967a482ea1a4bfeec4803847a859a4e60f6f6f1a4eb4c8b51eea37461d54b254d501495f56acea8f9337eaeddf7078541e7317d047c9cf4", 0x82}, {&(0x7f0000003a00)="9aea01cf1aeb3e8ae91bcf8c92ef1656defc47681442262dc798cf19b050bcdf657ec279680b80fba05aa683e0bfa63e6a0ca626ac354e6b9cc816ebeae1b9f4545c9563fe5dcd21cf80a59ec60e54b3158280a20b6ce158f9fd5943a5f340e7be899c9220ac612876a2223f244a3352fb8224a18a4df3ca86724095b97e583063b0e8223361a8fe8ce6dcc880d50b4fd4ab18d1dafa825e43b2f00208f8dc776b40b56572c2be10364eac20a0f868219aa5b8c6f0856117f2c8e435d311f853efd2ea4638c7c67e06a78c6c817cdbb0671bfdd8e717379a23d84408f32b05f4", 0xe0}, {&(0x7f0000003b00)="004177dc03919ee0f6d92c7ba0618b738ec84e467dc33ce8ef3b51c42575806a4dd926ee1325dff98d5b55621fa779fc182fc674c65f2aa727f06ac8aad1f9dfd4f56baec4903985d56886dba844684240027cfda8e63e40508b5dfd9ec66339ebfe38760ed74722c626a9d62fe4c3291be6295d1c3c9fac91b863e60a9a27c2c95dfd4f3cc5c5846678cf266344f43bee30f56dab9a3f6fbc3c89ba8e68a791cc3db0abeca8a232b36e0f6a96a73275e39d434f12a4993714f188b53e822810d23edfcb775bef876c4dad", 0xcb}, {&(0x7f0000003c00)="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", 0x1000}, {&(0x7f0000004c00)="135b68c1b3466b1eeac420077ea1ff34e521ea6e5334c4cba7fa3b3205b3bd1f13682d71008ecdccd3506e9cf880b8fb07131a18da8c1c68f11f7a88d77496c4c9fe20f6db866b4d0202f736bfbf843379a4", 0x52}, {&(0x7f0000004c80)="9a0fa8bc6a1ad08a59348b86ccf81c55b081f55ddb1220e830e57b9d9f4c1269d35a4becddb305d333b44c83b4025060cb34659fd380c33119d3fbe9db2b0c5d76b4a759f3936352", 0x48}, {&(0x7f0000004d00)="fa9b88998af2b62cce84ef00d745e4d8f48563da4b54a7488e08527da757bfdf12473d5716bbd825ba86728cb2fe6ea155d4413961d18011041f76b481581b9bf3fcae515962afad0f891fa71deb9964b5895870ba278a314eef6142af2573f8c9897efd1814fe0773d548c55ba9b87a0533da07d2ef0532a2bfb3c1ce662a34da48d2e3b3f8eccf2e4fc30921e2c759cdf73704d0a26aa297502a6e54feae9594dec5a046c1ed824a79ec7a1caa08e0b00c18d5ef0651caf373d27a4968a713", 0xc0}], 0x9, &(0x7f0000004e80)=[@mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x6}}], 0x30}}, {{&(0x7f0000004ec0)=@hci={0x1f, 0x4, 0x4}, 0x80, &(0x7f0000005100)=[{&(0x7f0000004f40)="3cf80491d823c1ed64126c6ab5ea71af71983462aba3e217f97e20549a1957f6e34f9ab1d099497abd13e8c51edf21a804ae1d8446fe38511a4eb265faa58b2f4b55f93b77646608a4c163698ff6bcce35e7e3f11468f9849a0ae2ec6b00222bb2a9c5972feb90549d31b594", 0x6c}, {&(0x7f0000004fc0)="9b125002fda86eac897dbbc14ac417ac43bf85266c45b47d0b0703f6558c5121878c2d7f6a8ebc11b46c69db977511bedaa61445b2b6df66", 0x38}, {&(0x7f0000005000)="51e78de6b72094a58a46a77fb2eae913c7c2d466c3886cbecfd31774944b8d6262e3f250fc26b16910d5ea03fe3cb6194efc1c3c19cdcb1c5b253c8e147a501b489c8d354a21b72fb5716d5718d7334fc82ba7307e612fdcd76b8eab5125ca40874253a479a846c8146c82f79d4ac4d8a93033", 0x73}, {&(0x7f0000005080)="8af7048265ae9a19d7b90354cd3f2a413e7d5e436e3ab31a051648744bead73efeb52f12e22111593a4b332d0299f19e991eaf442855176bdbd876afed43f80d2f001c4891e7e8bdb6b3ddded6472b2e88285e6cf0227ef4a7c83a768fe99fd22505062fcb2c5dac", 0x68}], 0x4, &(0x7f0000005140)=[@mark={{0x14, 0x1, 0x24, 0xfffffffb}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @mark={{0x14, 0x1, 0x24, 0xcbb}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffff}}, @txtime={{0x18, 0x1, 0x3d, 0x7a7d}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x71}}], 0xc0}}, {{&(0x7f0000005200)=@xdp={0x2c, 0xa, r5, 0x22}, 0x80, &(0x7f0000006600)=[{&(0x7f0000005280)="069f90ec9aa9cdc6b800a91d2cc0796339308fb65bbbc2b0a32084e14d11303cac21f259d3938b676b54121cbbe41a7e5216e1ee8d9fa94a56b9d4111514e80a00e0e380e6ee176401f4431205cf975cc22d031bdc038da8eac360a996ac5f26530d138f138baee330588467ad9533c2ab722bb4a5bb7f3addf8e2", 0x7b}, {&(0x7f0000005300)="b2d80871ffe2a59854ab620b23e94ada7fe35cd0994d6c91c3c04b17e465fd6875fd17a1617b07800c7375cbce651afaed9c4c33af1e2f4794cfa04050396e597b51c18d1fcd6734f9ee05151cbf2766bfe77dc56ee4c35c95cf89441952676355ab26815901815d56846be66a7a22fff67669cb1edf6054dde44809bae79b51434b4907c2fb08442354e6b5f13699af66", 0x91}, {&(0x7f00000053c0)="85365d361de6960e71d6887789e689cd7895d6d08d52a47e645c1ad607cb1916d4113c0c96e76fa6c1d8f5c9e12804d91ab5bed65a422a4e6c237963e5c639d6bac4dfae0afcf3f7f2b6503450435b3e918d2bc7c6815f5a1faf97e4fbfe5f92c1ce044931ffa894103018c7bebd848dacbfd7da0aa5f7244529bc9996aefd1e23f21fcd8e1b28eb", 0x88}, {&(0x7f0000005480)="8c3c80a946b66b037944e2b39c0352e8007be38f42642a5ed4", 0x19}, {&(0x7f00000054c0)="e4ebddd35cc475171faf8bd706ff5caf67198fdb411c00bdbb41aa31405ce5e2245d65ae1b491bdf723715de95965a295c386c90284dd04a7824684b7e7709625bc879987aecc716de8a400c54611dc699c18c98d37808754cbfa77365faa579143d0be745c0e2ca89d332c0280c07ddbccaf0ca0d950b0dcc0608d80b9264cfe72c8313dca4c38d5e2bb4273dc22cf2b7f3352d0160dc66d76f0732bc7dee93c1e83ca4badfec65c9c3546eac74c2fc9d151e76ca988973eaf4ed48ee7869a1e33c6dc0c821a71f52ec94618fb09d53bab0cc14324611d3667b3a", 0xdb}, {&(0x7f00000055c0)="605ecb355a3da4a3978fe19f0ae13632900f6bfde9cbb0e9feaeac61926e90222ea513459a", 0x25}, {&(0x7f0000005600)="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", 0x1000}], 0x7, &(0x7f0000006680)=[@mark={{0x14, 0x1, 0x24, 0x7fffffff}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x61}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x1f}}], 0xa8}}], 0x6, 0x4) ioctl$SG_IO(r0, 0x2285, &(0x7f00000000c0)={0x53, 0xfffffffffffffffe, 0x70, 0x0, @scatter={0x0, 0x200000, &(0x7f0000000240)}, &(0x7f0000000040)="59a59588c65becefec3acdfdbadd5ea2cab5523bafcea2a26effb9162cb67de31c060000053604a1c18ebf63b4a2f255a040f3242de34e42f50e1d4abb5945533310adc5fcdb67f95933c7f76ba97ec200beb7b76672ef8bf9a3c92943339eec0e410cf7af2b67c27d623a7a4266bc05", 0x0, 0xfffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffe}) 01:59:32 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x03') 01:59:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x9}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:32 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e06ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 740.426820][T25097] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:32 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e07ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:32 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x04') 01:59:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xa}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 740.669336][T25114] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:32 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e08ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:32 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x05') 01:59:32 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e11ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:32 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x40a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61f6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xa}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) dup(r4) write$FUSE_BMAP(r4, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x1000}}, 0x18) sendmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x7000000, 0x0}, 0x9000000}], 0x400000000000085, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 01:59:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xb}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 740.938346][T25126] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 740.970104][T25129] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:32 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e30ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:32 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e60ffffffe80000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:32 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x06') [ 741.152664][T25137] __nla_validate_parse: 36 callbacks suppressed [ 741.152677][T25137] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 741.281308][T25138] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 741.363475][T25138] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 741.396448][T25141] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 741.424037][T25144] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:33 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80300000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xc}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:33 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\a') 01:59:33 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80500000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) mmap(&(0x7f00008f4000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x0, 0xc0201) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r0, 0x8108551b, &(0x7f0000000380)) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x1) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='cgroup\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='cgroup\x00') sendfile(r1, r2, 0x0, 0x1) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000000)={0x4a, 0x20, &(0x7f0000001280)="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"}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) getsockname$l2tp6(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x20) [ 741.692843][T25151] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 741.710844][T25152] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 741.725573][T25155] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 741.757561][T25157] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 741.792634][T25159] hub 6-0:1.0: USB hub found 01:59:33 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\b') [ 741.814140][T25159] hub 6-0:1.0: 1 port detected [ 741.863399][T25157] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 741.897687][T25161] hub 6-0:1.0: USB hub found [ 741.906473][T25161] hub 6-0:1.0: 1 port detected 01:59:33 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80600000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 741.931804][T25167] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 741.969800][T25172] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:33 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x10') 01:59:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xe}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:33 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80700000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 742.153906][T25178] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 742.163645][T25179] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 742.231410][T25184] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:34 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0H') [ 742.294005][T25184] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:34 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80800000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 742.409569][T25188] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0H' 01:59:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xf}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:34 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe81100000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:34 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0L') [ 742.565410][T25197] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:34 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe83000000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 742.648899][T25201] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0L' 01:59:34 executing program 4: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000001c0)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000000)={r6, 0x3}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={r7, 0x400}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x3}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x202000, 0x1fa}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$netlink(0x10, 0x3, 0xf) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="2000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000c1121cfd0000"], 0x20}}, 0x0) 01:59:34 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0`') 01:59:34 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe86000000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x12}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 742.921702][T25212] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0`' 01:59:34 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80003000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:34 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0h') 01:59:34 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f0000000040)={0x234, 0x2, 0xfff, 0x40, 0x7fffffff, 0x6, 0x8}) r4 = socket$inet6(0xa, 0x0, 0xfffffffc) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x48082, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002700)={0x44, r7, 0x105, 0x0, 0x0, {0xb}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb}}, {0x6}}]}, 0xa2}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)={0x118, r7, 0x0, 0x70bd27, 0x25dfdbfd, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x118}, 0x1, 0x0, 0x0, 0x10004000}, 0x0) connect$inet6(r4, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000000)=0x576, 0x4) sendmmsg(r4, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 01:59:34 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80005000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 743.104912][T25223] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0h' [ 743.119465][T25225] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0h' 01:59:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x14}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:35 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0l') 01:59:35 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80006000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:35 executing program 4: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x2f5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendfile(r0, r0, &(0x7f0000000480), 0xa198) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) ioctl$KDDISABIO(r3, 0x4b37) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) pipe(0x0) [ 743.403472][T25236] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0l' [ 743.423236][T25240] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0l' 01:59:35 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80007000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 743.554660][ T27] audit: type=1800 audit(1589767175.322:557): pid=25244 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16355 res=0 01:59:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x15}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:35 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0t') [ 743.649952][T25246] MINIX-fs: mounting unchecked file system, running fsck is recommended 01:59:35 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80011000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 743.761821][T25254] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0t' 01:59:35 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0z') 01:59:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x16}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:35 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80020000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 744.026457][T25263] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0z' [ 744.050574][T25265] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0z' 01:59:36 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:36 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80030000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 744.389232][T25275] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x18}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:36 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 744.472340][ T7552] minix_free_inode: bit 1 already cleared 01:59:36 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80040000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 744.590673][T25287] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 744.604016][T25290] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:36 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:36 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80060000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x19}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:36 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800ff000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:36 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:36 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000100000000bbff02000000000000000000000000000100000e22"], 0x0) [ 745.036215][T25306] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 745.060624][T25309] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x48}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:36 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0 ') 01:59:37 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000300000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) setgid(0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r7) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r9) getgroups(0x5, &(0x7f0000000080)=[0x0, r7, r9, 0xee01, 0xffffffffffffffff]) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x201, {0x10, 0x1}, 0x0, 0xee01, r10, 0x4d4adfd, 0x469, 0x3, 0x1, 0x39e, 0x3, 0x3, 0x100000000, 0x7ff, 0x6, 0x80000001, 0x2, 0xca, 0x5, 0x10000}}, 0xa0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r11, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c0002000500070005"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r11], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="2000000011000d04000000000000000000000c00", @ANYRES32=r11, @ANYBLOB="ed07060001000000"], 0x20}}, 0x0) [ 745.273180][T25317] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0 ' [ 745.288873][T25320] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0 ' 01:59:37 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 745.355203][T25322] bridge2: port 1(bond0) entered blocking state [ 745.372273][T25322] bridge2: port 1(bond0) entered disabled state 01:59:37 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000500000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x4c}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 745.414672][T25322] device bond_slave_0 entered promiscuous mode [ 745.421870][T25322] device bond_slave_1 entered promiscuous mode [ 745.508478][T25327] device bond_slave_0 left promiscuous mode [ 745.515230][T25327] device bond_slave_1 left promiscuous mode [ 745.540123][T25332] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 745.548140][T25327] bridge2: port 1(bond0) entered disabled state 01:59:37 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000600000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:37 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x10') 01:59:37 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000700000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x60}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 745.800040][T25346] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 745.820492][T25349] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:37 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000800000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:37 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:37 executing program 4: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe900, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) syz_mount_image$cifs(&(0x7f00000006c0)='cifs\x00', &(0x7f0000000700)='./file0\x00', 0x3, 0x5, &(0x7f00000019c0)=[{&(0x7f0000000740)="4277c003f1debb8b7c2d7b2e680468b4ffcf60d730a27ba223664b1e81d408c3501e8eb8cead8a6aef36e43a3abcda8ec7ec1286ccb4b67e3919fac863d6c7f6c2c477ffebf433eedd06def0aea96eb78faa8283e03ece4147bb4eaf1a6391e0630166dc4ae91259418fe944552b1692", 0x70, 0xca6}, {&(0x7f00000007c0)="5c7ea4e81d89c1de8f53ceec68d39200b24c4b64311f8c28fc88323e8b2031ce56c2580156102dd2326a77da915eaea8aa7a319caff067a5050b6b26b1d220320b0259474cf3208d1d66625a168e9fed2fd90e4acbe17c80a8d144b4d6ff88fed2d14a0d41642900268f853e62caefe3825e3a018df7366e1e84c93922802ca62ccf65daaebbeb46c9752a67879fcecdf06f803e3032d4528d04cea9f9a95da86f8a199c67a21ee8f4f8fe20c4b22d9a77c6cb8b61b8fe8734a1954797fdcecbe79e1130baf6ac8c3255a838471258a70aaa2b37ee937ef7f7c8fea4237c330143ec4bfe9898f8835e82f1d6fa61ce8f7f", 0xf1, 0x6}, {&(0x7f00000008c0)="70a0287ee7a17d06b55a67670dce6dc9fd3fefea680b340fb4a0f9e095b45d5598bf4f1011a8bea3aa227a4090973b9e74047950e4d2e3a8906401320aa9fe6a2cfd38106d137b5a63beb9d1a49c778f08c6bf4302428d498a5dc9e331c0cfda61", 0x61, 0xea}, {&(0x7f0000000940)="54e77b0ed7b4385cd65be7e94212fcf178e33642b1a469a398b3c958445cbd8ce0025f5770705ae28e29a6c14214bad8825deb30de15587d40658838e160a800248571ab711f5b63b3e7c1f22e0db1772e6d2fe076d98046083ab5d5f2db961aca9b", 0x62, 0x2}, {&(0x7f00000009c0)="dc9130388a5191008011d1d2f3fbdc589be75b9c6fd61658d2a8310a3efbe9a6ba2fa0a9af30abf0b3b39868595a8e246d781ec71aae0191f8b0f025a1193f4eb3e9d7d76140ef1642f6d5ba7f50caf3a569a2252ed81777c0d75879d55484b383ffeeaf9c9358cce8f81f42bd21554347912c8e3258abc793136daa644676e74b69afa2649fb9ead064a164b356541f85427633eac82e45e66df39f5f2d30a50684ba6422fb51c686060837d43d6a9a627b19b798d555f3cef36415e40ee07e2a127801eed7ef288ff2c6fd767cc5093ffbc7f44d161420cf500cbefc7bbad856f328251139b64af067ee2b19f09f1889e649f100dffc8570d259e09c6906856b05a4b87539d11b57925026de067585b45dbdd6645ab66caf3bfd189c692543e03ab5288cdf565589047c839842c993a0638d49183949485856d1805d5159afe920a6b83ee0798cf2b0ae785a43af87e6b0b7a3bfff5220d138a261edd4f8023bb7c2492fd8034f65535550719d5328d7ff33f0f288de566481f0a2a03f122b3ea85fbc0def4897679a26cf1b056ff5cfece7b658bf0620f89fd16b62f2463f87917686e78ac10fdb9bca48381e7d40b7af435d0e457592571e42a6abd8b6ba7f355fc148fcd687fd78f1cf41e147f0ec3d8dd265ad90c0cd2c6a56053c3c080b8289117faae0f7528f20e720b51a6b01ba62d62c748e9ec6fe3ea36476c7fb0073285ceef158dfbbb384fd494001ba4ec34901760119d37baf03c180c0959f2c769fd2913ddc1357e01a12701aa98acc181c16d18c03dcc735759cdffcf6b05493919bfb9068b77838ccab01a4599464be12814f59aa14a6aa713123a6d58b1816e842f45000d232a30b965dc92d93e99754311f4631d6f7975e934b5b440e5877a8e2209e799109fce94afd2f6480a35c6f796a0f80414857bfc8e85a5322dea6c449f747d64817cd5951bb2ce6eba929b6a55eff0182e633149f9dbcd10140a65ee0f166115d8a766000c7011cfd4cacc3921af3c4699a6b235616b8c8925a9be0f2711e9861246e901ead5a5bc14b81b673d9aef0c764452f7f14505b20f0bc1e85d17e3b14a5ce3512e0ce102a77192bc13143e426d320c8680c2abe2bcdc7c538d96529a9c642ac793d46c9d59bf36aece9a55dac64649f178e2bf2007ef43e2e4f87d7f343b5618f8c7f1480979e84917af715d989d11869140729c499097787ba207502a6f7d14f37992c8ae9d6ed4d9caabcaf0e2fbca700820d0ece9ebfe010769bbbda741bf7d515eee471e5c0c11c6ae6d1e8db7c479c57df4da04a14ae5ae49b73f2f7cf1a0b98e13ad2964983494968a781ba2f4626b32e22a36b73e67e624e67d63b83863df1e5a90073965069cfbd75de7b190140da2c5aa5ac69d181628b2b03c13a3e5c85ae977f425138b1783f9000f6d9f311f39ae352c1079efd9bbdcb622f8e679d929112cf341a2dca46109232e774e1eb9689905fd7db74be08cbe29ec5ef0a49541baa695b992ae66925f6d53098b2b5794fd5572404e997ca9db03b844bbfcca897f4bbe0cb6aa2dd269df28258c505547a14f4bffa7383d2d7d18c0ecf62a916c27888e30bee88d4f4f0b1aab8520fcc38580088a97e8a79be138f28422cc2aa0dd927eab4916c145363f04f10faf3ccc643780380bc5185215e09b4877debf6eb430cb3cb630704f9421d6328f3c0e124fa50bbd93dd3491b9a4b8c508c10544718b9f79c932caf3846fe34cfcfe181ff3d21a956b7efe261c772c8c61731a45ad0b61526d3e002a3d483c3892399b0a78d3d438b498087c1565e5a47951ff7df430d0966669dff1da4fe77cf2b246f93d1b82d140b94dca49b0893e73ce20894d53c2369f5678371664dc11c05c212e77546494d0a497ecb4a65664f460c113a9a560e98de97879102f56b04600f28c988b0da659de8ddf2cb6c28953993167ef22e1f812cb768f9aaf15576dc8c67418f3f4e1be453b27dba335e23f598d9a2d34c6b749224e82523772f3fd158b5aa8bce661804194408971851df9d7a074c5de2fd95fbb3675eab30221e9b8515bb854d843a86847c06a039eeb2608cec6b0dd13d0976e88ff92ac90734510f1e6215b779d8ad09c86b12ba1a2ba5e4cf667123e16b7322d6b349a3ef0f626e10f1fa1acbc480b87c7596cb53dd95bb7bea7a2387c7d492e82f42108da16e494e1a83ae80efe4c8ec66f4df82fe0c1d0a1894454f7e7ddb52518217229527160f623a81a5f4eb58f3ae75278700788a71aa67b79881fe82890ecb403f596039a6f48d5b5eac967a5553f43183d2a1f2a03b98bcca0730e4f96f24b3e10a80d01da6ddc90a944034824a986fe05fc030a712aaead879014e79a952ebcb10d96ee7aef9f850540c5cc29861a7c3ee0c7aefa9656c99d1bbe23fe2fa197117e5f2f51c401cdc7018cd8a38eabaff85c7b1478d44685872c35a786db84af141c22dc5456c957abc93efa7a389530b34f6fb1cf78a006b0a44c15d2c5b62cb151f71aa13de74a39ebcf84434bdfe2a6dfb595a54feade62ecb84b1bf93f9f4469e77e0763a36fdc49a1eae837acf6119b1c29066d37a4a131c9400326528ae51df8e1c47393e9b076d5f3c1ac44add3ac6cb70e0194fa779d5edfcc73239b1ab9a2832fee8aa43e1028543df6c2688d4795819ea0296c2c44a9598f9526b00aff7118672f4c5d0d69b0c889578b89a1dec8864f2e3013200fbc3a6e8985a8ce622d3181d59f437e3c27f19c30eb93a121deaa9810508902fec93eec48eccac23fe3543775a3fd237ba98d40a4e23aeabaafb70e74b609e092781c735293f30dc122ff3d7cc92833cc575d733a0166de7d99ccf9891d70a0de17c15ca1bb893dd8caba6a8c5f019702389c9f444ad42698f26bd07f5db099e512356f065e01cc6f21114dfa182e86cb3488b51f882ab54d38ae3ed47783f73ad2a17d84c8103b228d025a61d4d52f81de50013ed80545336aff48d6b1ba90f29431386bdb35a40a8d6bd6bfbe413273152639293851747661612ac226f721774eab586f0f9c7f61dc7729c988286a78d36fc8cd9d4690dcc012a1ab743444db1ee5e0bac9b4dc233fceb9e7389f51e59ef721c101f5a0471937d7fd5f17536654b8ee5044e129b4cc4df36dd64b426a942e7e2f5119f4e169e70db332447021bb307f9be302d2f7bc7a24eb156f4de3daacb5fa50a9ff10db9429ec1a50b858a3f1f2a1f6c274655c04ac991e22c166aa3147772dea69f577c550b145fc1d453636bc40db6c4275b8443fe24d24c226cdb5c41aa6565e4783a9e5847f9f4abc72bb5439beac36e8199d04f83c234d36354cda02b58b5faad45c7afa6895897b97a115c76b99573c5e1c2d2020eb966076e78d084e8205699032bbb18e113dface311f78b87ccb5be478c4de31f340c35226e2f55521379b8ae2e4617e396a23c8d6961b58826499be9496458534bb1aded0822558ad5138ea3dd04ee1b02cb0c55b6a455c2caf52ca392652a18d378bca92bfb0b8c228cf365aee1cd9f28ffbb423b394ef6c1975f9c1164a104fbe30fa34980b2584d1ab8dfba864fe457f0a2e39363b931f1c1c425d79b92f988ce05a3032de35a7e4531fe4250d1211118aa5867a2431e02a4d59af4af4be6967b6d276ebae7bc616f22cc6c8f5ec3db73a334118681da4177136b116beacb35ba219e5f565a09d19d0a503261268dd0154f781ee958be3542a553ed8d9fc0fa7b21826e5609b822249a82e8b7ae0bad0b895e5eddb1a1af1367ade2cc3e014ec62737350a7a37db9f40a234d4c52292e1364dfabab058043b49dd544b936adbb3873ca156e109dc5df88f76b480026275f5c074c6d6b0cb7eea4c0ed8e90142341e70e749296c09310b3f50b4d59c2f4762712f1cf5d2824053650246645346b535b7ce140eb8048d9989b7c9a8e552acd16daef61bff1b8016a37d2e0f4502b0df1400a3831435625542a4ac8d082fee1a9389077cf6f5ca0910351fb48647bb5b913a5db4e36c1843457528d493e9b22e74212cea14ebdc37c51b1de653a2191e6f93b69020cc4e31550ad210f651bff940c97ec28150275e5519c34352a43ab963ef91c7ff5e8cbefb5f02ed60944ddf8c467b0ccedf7ea9de810d89fa2d1ae7e69f08431785274d06062ac532ad15f2dd7ad1f53da55d3910f1b797f9f5f53604ed25136653b280118dfad5eb02942e98981810777da13ebb6279c33a686ae36d91f8aff6076481150827bafce1ee18306773d1f522c878988c33d309a86569d0a0846e084c3bee82ab192afaf682439f19839d34019f76e2ee101cf397ff9ad9900480f113a924f3a86b4912110e0596b855654e096205e7a8cec46080eb97468f94949e82e830b8f103bfdd8503fe96cb8854757bcbb555a9172ccf76f95578f5d385372ea3bcf14c6b013d4444fcb1d34de782e1917309f19ccb98c55663fc6eacd941c68126a0a5ebe4556b4f93200633afcaa43327b3aaabe984db01744d472e376e3e024b166ee0d0656ed14ef86c20e3848f99935e71f1f6faedceb45133d4dac7daafad6b711845670f446e55ed46e349a9f9066e9e2cbacf6723179ceea2d0329c1724277210847145f2c8414b439a5e096f1263e1462908c309264d3be1aaac95626aad6d515566ebdfb2638b51dd7344951942cd3f8305ae7ebfe5f5fb8d7992f92fed976e127f698cc00ea066b54b6ffdf533cc926d8b472f7eede0e1c26f8015a1559b7d6af4a7e35cc762846717dfd64d32ff56570693bbbbccabd940580314556c1e52fd7e7c4766046e10d2a0b84547391f5bb104ed2358fc5456611ce437d318b57ea5fb86e0eaec04eaa3ce0bd0915cc059712c11c6e1cd7eba171be2e8789ddb7e3ed2360a7696793242234b75c867345433727e8c40e2aefd41afd3c0ef9d3181e747bae60f7dd0f6562aee3805c72eb56be9a2c8a85de6b54541d668f466708c8c4f1c46b05e18fb70b0b146f6a534fc0ab28c2cd8684a8e5a1f865775188ea779d61db5e7a11e301f5009ce725c65044b4b5c22e3a0899fb73026c5a6a63da32b869adc1657fd05720a1ad0b491665ba87ae94cfa52074f5dbdb0f013fe5a868f4e7a5f5fe660b1d6e438f9ad2e886f87135911b4fc4cd18cb452cd58f94b29504d89d75ad550480d42f779f6447d3a45957e1621f709ee01e64adc39efa5696ec312f2ba1052baa56b7fea1e7ce679de26e61e267981988925b63b88835f8037f6300f5dac56d23092e7983d22b4084eb5cb8c826b69fe6a71c6076714d2369177b67b3d132f957f234147c9e03afd1aad9e1ee37e2aa9371dac15d9aab2120bd63835e9af91967fea74fd1b9e12591068509194f78c506aaeb2fd5c648505627983da2544892d12e9b919b5e70984a266a4d1071b76f9f7fa00b739e474aa6c5b8fca78d0e66ce961292c3345d3f77292a9b17905f9ce380f223ef727a1ebcdee6db28e4595a1ae672cc254f544838e5258a1ad9ac70b5e6b46a3a71a80ded573f20c75404e2a44d1496c102639cf2fffcb48bc50d1dec2a03c26678eb290baae213f24c25ebf3a71e3400f058212f5b5f291e09bf1152a2680213fbaf9516d860a42e589fde9af68fb046d87d9b686cab1ebdc0985972a33a63d055b74b287cafc3291f07c3c9e22b70d418770843a7e9b0f78926a90b2645a155f7f5ee0f8a18d880be868cd7843ed3e719904233f1d9d1903676aa9b262d2ed9af71d502c4672c7270d2acf73b5247b6490b8b978", 0x1000, 0x7}], 0x100400, &(0x7f0000001a40)='\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001a80)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x806000) write$cgroup_int(r3, &(0x7f0000000200), 0x6300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$ocfs2(&(0x7f00000000c0)='ocfs2\x00', &(0x7f00000002c0)='./file0\x00', 0x3, 0x4, &(0x7f0000000600)=[{&(0x7f0000000300)="a0924cba152da46a31c437acb7c5f3df043940c1634566719436dd23a1748b38585553065aae789ef11e44c0", 0x2c, 0x1}, {&(0x7f0000000380)="f3f4dbb59ee8971027985fa1554c9655ffd66ab299fb503085c3b2d13e3231b6455be4064f7a8a8509feba12395ae2af7705d1e5ef0e5d883022b2300d56922e2909da8bd17f62a671b3944a1a459b98fa100bfa3b51a64c537e3ced47323a16db480469863adf27e670064c2141069c10968752d4ecec528e5ad242b13e5e8927a8171600a522323ae20ef113df314c4c0a2fed2ebbbc83ac1fb866585032828b630f1644cab71bedd22c420eeb33633a6ae8249727f022368b76107aac098daf3a371613dd79e97264dcb1b9d6f6fe1c1ec44543216b92", 0xd8, 0x8}, {&(0x7f0000000480)="18cb87353350ffb82f4845243d0d5a50ef2a41f3b3ff6ef5bb938c47c36e40d13c7432fe6f394c34fe8e24c426712211e1b7dacd3502289e0f46349cc2437a3cad97d394ba30fc412540ea11aa702df52b651c114c08f01da647c376c20e3eda0853ed3d59cbce9892811cabba143e9f08ec862863c1b4d7db91bb295752c78aea74dcb9d39b374ece4de10e18327bd93043f638b8b3051732134389fe1fa69928014c7b697d092e8bf6796dda0981c75eca793aebc40a606c9ec1e814acb3f81082232a11b4ca3a21b14191db10b505337b3f4b", 0xd4, 0x8001}, {&(0x7f00000005c0)="07a4549378d3ba9851", 0x9}], 0xc1000, &(0x7f0000000680)='msdos\x00') r7 = dup3(r6, r5, 0x0) dup(r7) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {}]}) [ 746.028610][T25358] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:37 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000001100000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x68}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:37 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 746.261874][T25370] __nla_validate_parse: 36 callbacks suppressed [ 746.261885][T25370] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:38 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000002000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 746.347769][T25374] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 746.363666][T25376] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 746.392774][T25378] FAT-fs (loop4): error, invalid access to FAT (entry 0x0000024f) [ 746.422240][T25378] FAT-fs (loop4): Filesystem has been set read-only 01:59:38 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 746.440963][T25373] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 746.542414][T25370] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 746.574278][T25385] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:38 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000003000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 746.592603][T25389] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x206, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) 01:59:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x6c}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:38 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:38 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000004000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 746.786469][T25397] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 746.810396][T25398] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 746.824666][T25400] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 746.851613][T25402] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:38 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 746.914308][T25402] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:38 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000006000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x74}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 747.041502][T25407] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 747.063355][T25410] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:38 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:38 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8ffffff8d00000000bbff02000000000000000000000000000100000e22"], 0x0) [ 747.202260][T25415] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 747.249089][T25418] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:39 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8fffffff500000000bbff02000000000000000000000000000100000e22"], 0x0) [ 747.291074][T25421] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:39 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 747.356189][T25421] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:39 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8000000ff00000000bbff02000000000000000000000000000100000e22"], 0x0) [ 747.509159][T25428] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 747.529774][T25430] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x7a}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:40 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe88dffffff00000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:40 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\xc0') 01:59:40 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYBLOB="5000000010001fff000000000000000000ff0000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001280090001007665746800000000180002801400010000000000", @ANYRES32=0x0, @ANYBLOB="f5ffe5d50000000008000a00", @ANYRES32=0x0, @ANYBLOB="c8194895dcbd93fc5f914edea06bc81b867d9aa3fc44a2f8d8c8832318ed93b2889561c2b20115dcaf3271a65bcd422af1b3426dc267f412eb1e7c"], 0x50}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000002c0)=0x7, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup3(r8, r7, 0x0) dup(r9) ioctl$DRM_IOCTL_MODE_SETGAMMA(r9, 0xc02064a5, &(0x7f0000000240)={0x3c2, 0x4, &(0x7f0000000100)=[0x7fe, 0xe81, 0x200, 0x7], &(0x7f0000000140)=[0x7], &(0x7f0000000200)=[0x8, 0x9, 0xfff, 0x9, 0xef]}) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000080)=r6) 01:59:40 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8f5ffffff00000000bbff02000000000000000000000000000100000e22"], 0x0) [ 748.771924][T25442] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 748.796978][T25443] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0À' [ 748.880736][T25450] device veth8 entered promiscuous mode 01:59:40 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:40 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000001bbff02000000000000000000000000000100000e22"], 0x0) 01:59:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x7d}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 749.038559][T25461] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 749.069363][T25464] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:40 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000003bbff02000000000000000000000000000100000e22"], 0x0) 01:59:40 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 749.279776][T25474] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 749.311700][T25477] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:41 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000005bbff02000000000000000000000000000100000e22"], 0x0) 01:59:41 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 749.402035][T25450] device veth8 entered promiscuous mode 01:59:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x85}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:41 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000006bbff02000000000000000000000000000100000e22"], 0x0) [ 749.524386][T25489] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 749.555108][T25492] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:41 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 749.774712][T25499] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 749.793760][T25501] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:41 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1ac5e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x30000, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={&(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, &(0x7f00000001c0)={r3, 0x7, 0x7, 0x5, 0x200, 0x685, 0x0, 0x3, 0x3, 0x2, 0x20, 0x9}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200047ff, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x1af) 01:59:41 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:41 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000007bbff02000000000000000000000000000100000e22"], 0x0) 01:59:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xa5}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 750.019165][T25506] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 750.042296][T25512] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:41 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000008bbff02000000000000000000000000000100000e22"], 0x0) 01:59:41 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xf0}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 750.264875][T25519] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 750.290823][T25523] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:42 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000011bbff02000000000000000000000000000100000e22"], 0x0) 01:59:42 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:42 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000020bbff02000000000000000000000000000100000e22"], 0x0) [ 750.456103][T25530] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:42 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x300}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 750.703600][T25540] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 750.723427][T25544] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000500)={r4, r5, 0xfff8, 0x4f, &(0x7f00000002c0)="3159eaabdc27d10612256eb912b1b9179755ac1e79468a2baf614ff9239195e9595e0d583514da1b0e89a4ee8ee83915b012838aef78c452f26eacf31b8a4dd0125e4916bb279b82fb3d568013ebc6", 0x9, 0x2d, 0x7, 0x81, 0x8, 0x3, 0x401, 'syz1\x00'}) r6 = socket(0x1000000010, 0x80002, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000089a173d2000000", @ANYRES32=r9, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newtfilter={0x5c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {}, {0xb6ea6f9b087d72b3}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0x2c, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x18, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8}]}]}, @TCA_FLOWER_KEY_ENC_OPTS_MASK={0x10, 0x55, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0xc, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8}]}]}]}}]}, 0x5c}}, 0x0) sendmmsg$alg(r6, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 01:59:42 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000030bbff02000000000000000000000000000100000e22"], 0x0) 01:59:42 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x364}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 751.173893][T25555] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 751.190571][T25561] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:43 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000040bbff02000000000000000000000000000100000e22"], 0x0) 01:59:43 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 751.273184][T25558] __nla_validate_parse: 24 callbacks suppressed [ 751.273195][T25558] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 751.294145][T25556] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:43 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000060bbff02000000000000000000000000000100000e22"], 0x0) 01:59:43 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x8, &(0x7f0000000600)=0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_submit(r2, 0x1, &(0x7f0000000580)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x2}]) io_cancel(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 01:59:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x500}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 751.471235][T25573] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 751.484974][T25576] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 751.550175][T25582] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 751.620857][T25584] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:43 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:43 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800000000ffffff8dbbff02000000000000000000000000000100000e22"], 0x0) [ 751.668069][T25582] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:43 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$key(0xf, 0x3, 0x2) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) sched_rr_get_interval(r2, &(0x7f0000000000)) sendmsg$key(r1, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x6, 0x33, 0xffffff03, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}]}, 0x68}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2438c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xf186, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000000140)=0x28f) 01:59:43 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800000000fffffff5bbff02000000000000000000000000000100000e22"], 0x0) 01:59:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x600}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 751.771106][T25591] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 751.791385][T25593] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:43 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 751.939900][T25601] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:43 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800000000000000ffbbff02000000000000000000000000000100000e22"], 0x0) [ 752.028984][T25605] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 752.047408][T25609] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 752.055437][T25603] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 752.122136][T25601] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:43 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800000000ffffffffbbff02000000000000000000000000000100000e22"], 0x0) 01:59:43 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x700}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 752.288331][T25615] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 752.326151][T25618] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:44 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8ffffffffffffffffbbff02000000000000000000000000000100000e22"], 0x0) 01:59:44 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 752.429925][T25621] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:44 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80003000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 752.510575][T25624] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 752.566303][T25627] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 752.582425][T25630] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:44 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 752.794595][T25636] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 752.808777][T25639] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:44 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:44 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80005000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x900}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 752.996000][T25643] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 753.024706][T25647] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:44 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80006000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:44 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:45 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80007000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 753.226411][T25657] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xa00}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:45 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:45 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80008000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 753.466760][T25667] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 753.495722][T25671] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:45 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:45 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80011000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xb00}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 753.682402][T25676] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 753.704629][T25679] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:45 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\xff') 01:59:45 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80030000000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 753.892530][T25688] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0ÿ' [ 753.916809][T25692] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0ÿ' 01:59:45 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:45 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80060000000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xc00}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 754.114376][T25697] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 754.137095][T25702] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:45 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000030000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:46 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\xff') [ 754.338392][T25709] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0ÿ' 01:59:46 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000050000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 754.382325][T25711] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0ÿ' 01:59:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xe00}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:46 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\xff') 01:59:46 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000060000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 754.610253][T25720] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0ÿ' [ 754.632138][T25724] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0ÿ' 01:59:46 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000070000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:46 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xf00}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:46 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000110000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 754.866690][T25731] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 754.886527][T25734] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:46 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\xf9') 01:59:46 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000200000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x1200}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 755.127838][T25741] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0ù' [ 755.159979][T25745] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0ù' 01:59:47 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000300000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:47 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x8c') 01:59:47 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000940)=ANY=[@ANYBLOB='my\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x33c}, 0x1, 0x0, 0x0, 0x20000801}, 0x80) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x78, r4, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x28, 0xc, 0x0, 0x1, [{0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xcb28e9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7b784acc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6907ac02}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcf6a}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x78}, 0x1, 0x0, 0x0, 0x880}, 0x4080) close(r0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001480)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c, &(0x7f00000013c0)=[{&(0x7f0000000140)="b4", 0x1}], 0x1, &(0x7f0000000040)=[@dstaddrv4={0x18, 0x84, 0x7, @remote}], 0x18}, 0xc8d2) 01:59:47 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000400000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 755.399658][T25756] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0Œ' [ 755.415263][T25761] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0Œ' 01:59:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x1400}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x0) creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040), 0x4) rmdir(&(0x7f00000000c0)='./bus/file0\x00') 01:59:47 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\xf6') 01:59:47 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000600000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 755.744213][T25772] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0ö' [ 755.744485][T25770] overlayfs: failed to resolve './file0': -2 [ 755.789458][T25777] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0ö' 01:59:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x1500}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:47 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:47 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000ff0000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:47 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ERR(r4, 0x4008af22, &(0x7f0000000080)={0x2, r8}) [ 756.092493][T25786] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 756.116281][T25790] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:47 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000001000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:48 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x1600}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:48 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 756.358167][T25799] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:48 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000003000000bbff02000000000000000000000000000100000e22"], 0x0) [ 756.401977][T25804] __nla_validate_parse: 35 callbacks suppressed [ 756.401988][T25804] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:48 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 756.499408][T25808] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 756.510287][T25806] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:48 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:48 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000005000000bbff02000000000000000000000000000100000e22"], 0x0) [ 756.575059][T25813] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 756.592011][T25804] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:48 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 756.677441][T25819] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x2, 0x2812, r2, 0x0) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VHOST_SET_OWNER(r7, 0xaf01, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r3, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000040)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r8, 0x0) 01:59:48 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000006000000bbff02000000000000000000000000000100000e22"], 0x0) [ 756.791331][T25824] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 756.821365][T25826] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x1800}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:48 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:48 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000007000000bbff02000000000000000000000000000100000e22"], 0x0) [ 756.969124][T25835] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:48 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000008000000bbff02000000000000000000000000000100000e22"], 0x0) [ 757.030223][T25838] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 757.066577][T25840] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 757.096914][T25842] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 757.108115][T25838] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r3, r7, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000003180)=[@textreal={0x8, &(0x7f0000002e00)="f30f09baf80c66b89a205d8266efbafc0cb80000ef0f1274000f7870ec0f5b290f971600000ffc0fddb735000f30af", 0x2f}], 0x1, 0x45, &(0x7f00000031c0)=[@cr0={0x0, 0x40030}, @cr0={0x0, 0x10000}], 0x2) r8 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='ext3\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) connect$phonet_pipe(0xffffffffffffffff, &(0x7f0000003200)={0x23, 0x1, 0x9, 0x2}, 0x10) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r9, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) recvmmsg(r9, &(0x7f0000002f40)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/16, 0x10}, {&(0x7f0000000140)=""/27, 0x1b}, {&(0x7f0000000180)=""/81, 0x51}], 0x3, &(0x7f0000000280)=""/181, 0xb5}, 0xffffff16}, {{&(0x7f0000000340)=@can, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/44, 0x2c}], 0x1, &(0x7f0000000440)=""/17, 0x11}, 0x6}, {{&(0x7f0000000480)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/137, 0x89}, {&(0x7f0000000600)=""/65, 0x41}, {&(0x7f0000000680)=""/98, 0x62}, {&(0x7f0000000700)=""/211, 0xd3}, {&(0x7f0000000800)=""/139, 0x8b}, {&(0x7f00000008c0)=""/250, 0xfa}], 0x6, &(0x7f0000000a40)=""/212, 0xd4}, 0x8000}, {{&(0x7f0000000b40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000bc0)=""/64, 0x40}, {&(0x7f0000000c00)=""/118, 0x76}, {&(0x7f0000000c80)=""/75, 0x4b}], 0x3, &(0x7f0000000d40)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000001d40)=@tipc=@id, 0x80, &(0x7f0000002e40)=[{&(0x7f0000001dc0)=""/19, 0x13}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)}], 0x3, &(0x7f0000002e80)=""/180, 0xb4}, 0x9}], 0x5, 0x1, &(0x7f0000003080)) accept4(r10, &(0x7f00000030c0)=@hci, &(0x7f0000003140)=0x80, 0x80000) 01:59:48 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:49 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000011000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x1900}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 757.286379][T25851] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 757.310943][T25852] EXT4-fs (nullb0): VFS: Can't find ext4 filesystem [ 757.310969][T25854] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:49 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:49 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000020000000bbff02000000000000000000000000000100000e22"], 0x0) [ 757.407017][T25859] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 757.500509][T25864] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 757.510883][T25861] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 757.524375][T25867] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:49 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000030000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:49 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 757.605211][T25859] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:49 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, r0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f00000000c0)={0x3, 0x1, 0x5, 0x8, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000100)={0x5, 0x7, 0x40007ffe, 0x8, r4}) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$UDMABUF_CREATE(r5, 0x40187542, &(0x7f0000000040)={r9, 0x1, 0x8000}) 01:59:49 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000040000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x2000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:49 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x2, 0x0, 0x0, 0xfe, 0x0, 0x41bd, 0x810e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x20a927, 0x2d, 0x0, 0xffffffffffffff9c}) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, 0xee00, 0x0) keyctl$chown(0x4, r2, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f0000000000)='*\xfdselinuxem1em1\x00', &(0x7f0000000040)) r3 = dup(r1) mmap(&(0x7f000000a000/0x200000)=nil, 0x203f00, 0x0, 0x30051, r3, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xa8940, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, &(0x7f0000000100)) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000180)) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000001c0)={r6}, 0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140)={r6, 0xfff9, 0x5, 0xffffffff, 0x63fc, 0x1}, &(0x7f0000000200)=0x14) 01:59:49 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x1804, 0x0, 0x9, 0x0, 0x800, 0xffffffff, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) close(0xffffffffffffffff) getitimer(0x3, &(0x7f0000000000)) accept4$packet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x3c1, 0x3, 0x328, 0x0, 0x140, 0x0, 0x140, 0x140, 0x258, 0x258, 0x258, 0x258, 0x258, 0x3, 0x0, {[{{@ipv6={@empty, @remote, [], [], 'ipvlan0\x00', 'batadv_slave_1\x00', {}, {}, 0x21}, 0x0, 0x120, 0x140, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ipv6={@rand_addr=' \x01\x00', @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'syzkaller0\x00', 'macvlan0\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@remote, 'macvtap0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x388) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x6) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000200)=""/107, 0x6b, 0x0, 0x0, 0x0) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000040)={'hsr0\x00', 0x7}) socket$inet6_tcp(0xa, 0x1, 0x0) setpriority(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) read$midi(0xffffffffffffffff, &(0x7f00000000c0)=""/59, 0x3b) timer_create(0x6, &(0x7f0000000100)={0x0, 0x31, 0x9ea2e486ec3d7677}, 0x0) timer_getoverrun(0x0) [ 757.833882][T25881] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:49 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000060000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x1b0001}, [@ldst={0xffffffbd, 0x2, 0x4f04}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) 01:59:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x1e, 0x805, 0x0) listen(r3, 0x0) sendmsg$tipc(r3, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000002c0)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000040)={0x401, 0x6, 0x0, 0x80, 0x3, 0xca, 0xfffff8fc, 0x5, r6}, &(0x7f0000000080)=0x20) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x400c047}, 0x20000000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x7c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x38, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @empty}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_6RD_PREFIX={0x14, 0xb, @empty}, @IFLA_IPTUN_TTL={0x5, 0x4, 0x7}, @IFLA_IPTUN_FLAGS={0x6, 0x8, 0x1f}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r3, 0x8982, &(0x7f00000001c0)) r10 = dup3(r9, r8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) [ 757.977954][T25889] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 757.997662][T25894] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x3f00}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:49 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:49 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800ffffff8d000000bbff02000000000000000000000000000100000e22"], 0x0) [ 758.182194][T25902] IPv6: sit1: Disabled Multicast RS 01:59:50 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800fffffff5000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r2 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0x80, 0x800) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f00000013c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x44, 0x0, 0x7, 0x806, 0x0, 0x0, {0x2, 0x0, 0x2}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x7fff}, @NFACCT_QUOTA={0xc}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0xc42}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x9}]}, 0x44}, 0x1, 0x0, 0x0, 0x814}, 0x40000) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, 0xffffffffffffffff, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r5, 0xc0205647, &(0x7f0000000100)={0xa00000, 0x0, 0x3, r6, 0x0, &(0x7f00000000c0)={0x9e0905, 0x1, [], @value64=0x15}}) ioctl$DRM_IOCTL_AGP_INFO(r7, 0x80386433, &(0x7f00000003c0)=""/4096) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@ccm_128={{0x303}, "b4bc64277b3511b7", "4ebe599d73c188315259f4219728b007", 'v(9N', "883938c86648ff51"}, 0x28) sendto$inet6(r0, &(0x7f0000000380)='R', 0x20000381, 0x14280000000000, 0x0, 0x0) [ 758.234750][T25910] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 758.262510][T25914] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:50 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x4000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$kcm(0x10, 0x2, 0x0) clock_adjtime(0x0, &(0x7f0000000040)={0x5334c0db}) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000010008108040f80ecdb4cb92e0a480e0040000000e8bd6efb250314000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)={0x24, r5, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x3c}]}, 0x24}}, 0x0) 01:59:50 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800000000ff000000bbff02000000000000000000000000000100000e22"], 0x0) [ 758.559052][T25926] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 758.583755][T25930] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:50 executing program 2: socket$netlink(0x10, 0x3, 0x10) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x15, 0x4, 0x1) sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, 0x0, 0x20068804) sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffce, 0x4000063, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x8000002, 0x0, @empty}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20010085, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0x800000001, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) sendto$packet(r1, &(0x7f0000000340), 0x0, 0xc0d7, 0x0, 0x0) 01:59:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x4800}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 759.057289][T25941] IPv6: sit1: Disabled Multicast RS 01:59:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x4c00}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:51 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8008dffffff000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:51 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:51 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000000)={0x10000, 0xc0000000, 0x2, 0x9, 0xb, "2ae7d791bafd9aaa108a0738a50df868d486e1"}) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0xfef3) write$binfmt_misc(r0, &(0x7f00000017c0)=ANY=[@ANYBLOB="33aaf1ad"], 0x6) [ 759.887309][T25962] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 759.911210][T25965] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:51 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800f5ffffff000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:51 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:51 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000030000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x6000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 760.198806][T25973] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:52 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000050000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:52 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:52 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000060000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 760.445680][T25985] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 760.461076][T25987] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x6403}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:52 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:52 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000070000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:52 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup(0xffffffffffffffff) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000001c0)={r6}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000200)={r6, 0x7, 0x3, [0x0, 0x6, 0x1]}, 0xe) getsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f0000000080), &(0x7f0000000180)=0x4) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000040)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@xino_on='xino=on'}]}) [ 760.648666][T25995] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 760.664274][T25999] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:52 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000080000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:52 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:52 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x2a) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r4, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x5, 0x0, 0x0, 0x0, 0x50d, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x809, 0x3}, r4, 0x1, 0xffffffffffffffff, 0x1) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x19404, 0x0) 01:59:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x6800}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:52 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000110000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 760.927989][T26012] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r1, &(0x7f0000001500)={&(0x7f0000000140)=@ax25={{0x3, @default}, [@rose, @remote, @netrom, @bcast, @bcast, @netrom, @null, @rose]}, 0x80, &(0x7f00000017c0)=[{&(0x7f00000001c0)=""/14, 0xe}, {&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000001440)=""/174, 0xae}, {&(0x7f0000000240)=""/53, 0x35}, {&(0x7f0000001580)=""/88, 0x58}, {&(0x7f0000001600)=""/227, 0xe3}, {&(0x7f0000001700)=""/150, 0x96}], 0x9, &(0x7f0000000380)=""/24, 0x18}, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x33000) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'virt_wifi0\x00', {0x2, 0x4e21, @loopback}}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f35ecdb4cb92e0c480e000d000000e8bd6efb250309000e000100244e48ff050005001201", 0x2e}], 0x1}, 0x0) [ 760.969068][T26015] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:52 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:52 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000300000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:52 executing program 2: ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x29d5}) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000008c0)=ANY=[@ANYRES16=0x0, @ANYBLOB="00000000000000000000110000002c00038008000200000000000800020000000011080002000000160008000200000000000800010000800c0001006574680000673131cfd0e34262fd4200000000000800010000000000080003000000000008000100000000003000058008000100756470001c0002800800020000000000080001000000000008000200000000000800010065746800a4d528"], 0xa4}}, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a943", 0x79, 0x9}], 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000200)={[], 0x0, 0x0, 0x0, 0x8174}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffd, 0x5, &(0x7f0000000600)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0xac}, {&(0x7f0000000100)="8a173cedbb64e52953d20527010a3d589245ec5ca255184112dee157ff8002e38833cb809efeed5f8ad44065c7c76dd35c7d10833440c559b0fa409dbfb1e2a5ef0f98ff4c55268509371a2b841744dc1a9418876c60c4ac47771a2a64b93dea1dceec5cc92ffb9f859b6e1d09594c58d2a77352133b74137b96d1aba42d1b74a0d00fa0d5453b705327b1b562042a0f890f01069ab81288eaeb1de0d7c5265f9ff34b7ef20d6d85a0cd62a642be4efe872c2521d1e593b8132ef89c7b6d7017a0a5d465da41e653cbee8e56d9b95b2920170712a0a88ca9ddd696854606258d06c30caed3eb72c893126eda", 0xec, 0x100000000000002}, {&(0x7f0000000280)="fc1ec68fa886a8c2e83a13ae1a48634667c8000cda92ba6e46d3472d72841e5b3cadf9eceee81ec40aab7036cf625d1162e734810f754904d0cd71ba4db297dbdd4a924cc50e2a6c25e357f0a71db34d50fc37c7a94e284ccc89654e79025ea214a7b223e17dd6032a93a0baeca67d89ee2bf79742a3ae96", 0x78, 0x1}, {&(0x7f0000000300)="52a2676e6d013d1c04fbae48345847cea042804cf9df88908da5a4bd0fbc93aa1bc59bdedcb16e0d430a9e471b1974046508e3bf059dbf9ab042400812dd6efcefb0ddcac4accc8a24ec5074a31609311686e7b36276a853c37d8a192e02be1d2c7284e3a6d3da77090b775a3696f36deefd00daa60da5fa90d933ce1a07abe1e7ef725a9f9c1906a3", 0x89, 0x7}, {&(0x7f0000000480)="82381ece1c2152287dbf9e735c267451c994186f7270eaa2fc7d952df0f5923d2b8a074175fcb0e555e078cc7e796e3ee8289ed5efe5f59f9cd7d6f473c48b0b2921c9a734a2de4f3c4b063b5671a9003b811b7cd5c597aeb2200cee2d15e6d6bb20252ae764a7d787fe6b315f6ccf4b6c98872b44ed6829b7ce5e0e24f3d80ca6218fc3379cfcdda19f6acb528ea49fa048b6d36035549c0b24764f613cd8074becd43bb421edde616bbc54aa1f43848e740aea59bdaf47849c5f21e0d703cd9be2fb5cbcd21a522af14ef6b6616407b942ac0984470a6166f27626949b73d5bdd247e9bee8", 0xe6, 0x10000}], 0x4801, 0x0) 01:59:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x6c00}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:53 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:53 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000600000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:53 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x2400c040, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) dup(r5) ioctl$BLKDISCARD(r5, 0x1277, &(0x7f0000000040)=0x7582) splice(r2, 0x0, r2, 0x0, 0x400, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x9, 0x4) 01:59:53 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000300000000bbff02000000000000000000000000000100000e22"], 0x0) [ 761.412150][T26033] __nla_validate_parse: 33 callbacks suppressed [ 761.412161][T26033] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 761.456166][T26037] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 761.472910][T26040] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:53 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:53 executing program 2: r0 = msgget$private(0x0, 0x2c0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/18) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f0000000080)) socket$inet6(0xa, 0x803, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) r1 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$MON_IOCX_GET(r6, 0x40189206, &(0x7f0000000180)={&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000100)=""/79, 0x4f}) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r1, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 01:59:53 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000500000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x7400}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='jffs2\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x21, 0x2}, 0x7) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x88) mmap(&(0x7f00005fe000/0x4000)=nil, 0x4000, 0x7ffffe, 0x11, r2, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8000552c, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0xc) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) r3 = getpid() pidfd_open(r3, 0x0) [ 761.631717][T26047] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 761.654614][T26051] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:53 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 761.766871][T26057] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:53 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000600000000bbff02000000000000000000000000000100000e22"], 0x0) [ 761.870048][T26059] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 761.898112][T26062] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:53 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 761.932323][T26059] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 762.057807][T26069] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:53 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000700000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:53 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 01:59:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000001100000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x7a00}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:54 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 762.233566][T26077] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000002000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 762.339256][T26083] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 762.345356][T26086] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 762.374970][T26088] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:54 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 762.399988][T26090] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000003000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 762.507628][T26083] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:54 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000001c0)={r3}, 0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={r3, 0xd71d, 0x8, 0x9, 0xfff, 0x20}, 0x14) r4 = dup3(r0, r1, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0xe0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) fanotify_mark(0xffffffffffffffff, 0x5a, 0x8000000, r8, &(0x7f0000000100)='./file0\x00') pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000000)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rffno=', @ANYRESHEX=r9, @ANYBLOB=',wfdno=', @ANYRESHEX=r10, @ANYBLOB=',debug=0x0000000000000000,uname=-GPLselfppp0cpusetwlan1%nodev@[-)[mime_type,cache=mmap,\x00']) [ 762.548312][T26097] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 762.574766][T26099] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 01:59:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x7d00}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000004000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200085}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_OVERLAY(r7, 0x4004560e, &(0x7f0000000040)=0x4b56) [ 762.828725][T26108] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000006000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:54 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) creat(&(0x7f00000002c0)='./file0/file0\x00', 0x40) link(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140)='./file0/file0\x00') r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x44800, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x4, 0x1, 0xfc, 0x1, 0x3}, 0xc) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1438c2, 0x0) write$cgroup_type(r1, &(0x7f0000000280)='threaded\x00', 0x9) readlink(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000180)=""/168, 0xa8) [ 762.931638][T26110] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8000000ff00000000bbff02000000000000000000000000000100000e22"], 0x0) [ 763.001962][T26110] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f0000000140)="f0fe063b0066b9800000c00f326635000100000f306766c74424000b3886226766c7442402570000006766c744240600000000670f011c24360f019aa50067dfbc350900000066b8000000000f23c82e0f3266350400a0000f23f8660f38800be3780fc75b0f80cc00", 0x69}], 0x1, 0x0, 0x0, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000000c0)={0x3f, 0x999, &(0x7f00000001c0)="92ce5a2f5cb6e18d0b0fb946c8b8261892fcade0a35d0a879f93500f1410bb2d5ae1838b73e28705aee8d39407b62ead639eb09c1a313fb916c035be10e770de8c35ed3e0c9119d333b24edad31cf8e93000391044211e54890747f91c39ba5139af6676fd2cc3713ab54caa2b2e062209db75819cbee426476f5d419693b4cc8d55742af77339a38f59a3", &(0x7f0000000000)="05f3cf4be156c55bbad2f9b6cc54c41b9800325e3f4ae528267d2630fda749d848d929463996241948667e522b9d95d61f7980e74efe00451f09127a068716bb1b2fbce4b19b4a5a581ada6c0916f96d578ab65af30ab8a92d187360746d8434da0c73f685c303c7113c5f73bb33ec57057ba8bed9538efc384d4c7ee8c8bb72", 0x8b, 0x80}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 01:59:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x8500}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000010000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) rmdir(&(0x7f00000000c0)='./file0\x00') r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) 01:59:55 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000030000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xa500}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:55 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000050000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) dup(r4) getsockname$ax25(r4, &(0x7f0000000400)={{0x3, @netrom}, [@null, @rose, @remote, @rose, @remote, @default, @null, @null]}, &(0x7f0000000480)=0x48) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r7, 0x8983, &(0x7f00000004c0)={0x2, 'ipvlan1\x00', {0x2}, 0xffc0}) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r9 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000580)={0x12, 0x10, 0xfa00, {&(0x7f0000000540), 0xffffffffffffffff, r9}}, 0x18) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000fb11f2dc8b0b288af79acb52274e53ab6e578be4fa9e3f2352083060", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00\r'], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x506, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x3, r8}}, 0x20}}, 0x0) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/asound/timers\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r10, 0xc0c85666, &(0x7f00000002c0)={{0x3, @name="524d9a1e511c0e14f71116ebb20ead859dae9cb24c71e69f384bb76196f79399"}, "676e98885dc82fa68f4da7baea948577930328cd756a323957fe472af1244f9d", 0x2}) 01:59:55 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000060000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@nodevmap='nodevmap'}]}}) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000100)=0x14) 01:59:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xf000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:55 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000070000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:55 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000080000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:55 executing program 2: mknod$loop(&(0x7f0000000000)='./file1\x00', 0x8, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x28010000, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 01:59:55 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000110000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xf0ff7f}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x80000) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="7c0008001523111f3a1a3ffa28850f5b8f7eaa5e88546b799b106bfc347de5e2c2186acdd3f9d47e061c0820425243dc0c232c989e3ea8f925d1ec3a485bf83a30be83857762b2e90af6ea33c7bd828e5adc5c03ced083", @ANYRES16=0x0, @ANYBLOB="220025bd7000fcdbdf250100000005000d000100000014001f00fe80000000000000000000000000002308000a000100000014000800726f7365300000000000000000000000080019006401010105000d000000000008000c000200000006000300030000000500050001000000"], 0x74}, 0x1, 0x0, 0x0, 0x400}, 0x40000) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000440)) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) dup(r5) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x80100, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f00000000c0)=""/215) unshare(0x40000000) 01:59:56 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000200000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:56 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000008, 0x10012, r1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x343) 01:59:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xf0ffff}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:56 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000300000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r2, r3, 0x0, 0x320f) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0xb, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000806) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000010000104000000000000000000000000f17e504fc11fb47cc70cf5d510c05afbff1edd7848f0023940ec4fe633528ed13a29271c9c0d8c2cb2911b98785c1503a3b90dc4a22ff7c68ece8b0afd2cc19a39251c36be4f95fb393840f431b8bacd1ae760769a281f03a6a8434e2a48161cfcccdf85576251989bcbd96acc7f12c7", @ANYRES32=0x0, @ANYBLOB="db80833c000000003000128008000100736974002400028008000200e000001306000d0000000000060011004e240000060008001f000000080004000100010008000a00", @ANYRES32=r6, @ANYBLOB], 0x60}}, 0x0) 01:59:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x40000, 0x0, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TCSETSW2(r5, 0x402c542c, &(0x7f0000000140)={0x7, 0x80, 0x5, 0xff, 0x80, "ce13e052048114ba7c97421fcdac8b2a307ef0", 0x6, 0x7fff}) r6 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000002c0)=0x7, 0x4) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup3(r8, r7, 0x0) dup(r9) getsockopt$packet_int(r9, 0x107, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 01:59:56 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000400000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x1000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:56 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000180)=ANY=[], 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "95cfb8c57ebde371503a38bd8e3f6ba990189977170a070502000000269a0b966b9b9d3289c8784f16963ce7c312649ce2996cd4d2fb7a95ff986185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e6265300"}, 0x80) sendmmsg$inet6(r1, &(0x7f0000002140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 01:59:56 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000600000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x5, 0x0, 0x0, 0x8, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYRESDEC=r1], 0x10}}, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000001c0)=0x3) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) fcntl$setpipe(r2, 0x407, 0x3) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4800) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, r5, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$TIPC_NL_MON_SET(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000600)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="000040cbc98324e8e0a546ec184679fe4f23028a"], 0x14}, 0x1, 0x0, 0x0, 0x20}, 0x4) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x200000, 0x0) connect$nfc_llcp(r6, &(0x7f0000000140)={0x27, 0x1, 0x1, 0x2, 0x7, 0x3f, "af2eca7a683edbcc4c3d108aff9ee6260ba4457eb3ba7cb2d06c9c0133b5006ff3db026469a9fa39c5d3ebb61f6c6684470abf4009fadadc9e1a9ba19a0b79", 0x16}, 0x60) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x38, r8, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5, 0x2}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x38}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)={0x74, r8, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd7c}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NODE={0x38, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x1}, 0x40890) 01:59:56 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000ffffff8d0000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x2000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:56 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000fffffff50000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:56 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "363c0d00f8ff007e00"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ptype\x00') socket$inet_tcp(0x2, 0x1, 0x0) 01:59:56 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000ff0000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:57 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800008dffffff0000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3c0000001008010400f7ffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01010400000000001c0012800b00010462726964676500000c000280050017e98458ba9ce0dbb7"], 0x3c}}, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@initdev={0xac, 0x1e, 0x0, 0x0}, @remote, r3}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) connect$inet(r0, &(0x7f0000000300)={0x2, 0x0, @multicast2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup3(r9, r8, 0x0) dup(r10) ioctl$BLKFLSBUF(r10, 0x1261, &(0x7f00000000c0)=0x3) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 01:59:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x3000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RMKNOD(r3, &(0x7f0000000040)={0x14, 0x13, 0x2, {0x80, 0x1, 0x4}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$FBIOPUT_VSCREENINFO(r9, 0x4601, &(0x7f00000000c0)={0x3c00, 0x800, 0x280, 0x30, 0x6, 0x200, 0x2, 0x1, {0x0, 0x800}, {0x1f, 0x8000, 0x1}, {0x20, 0x6}, {0x9, 0x0, 0x1}, 0x2, 0x10, 0xe53, 0x5, 0x0, 0xc4, 0x9, 0x800, 0x8ee8, 0x3, 0x4, 0x9, 0x4, 0x4, 0x3, 0xa}) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r10 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r10, 0x4400ae8f, 0x0) 01:59:57 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000f5ffffff0000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:57 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000300000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x4000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:57 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x48a681) write$vhci(r0, &(0x7f0000000200)=@HCI_VENDOR_PKT, 0x2) 01:59:57 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000500000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:57 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='pagemap\x00') r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) ioctl$SNDCTL_DSP_SPEED(r2, 0xc0045002, &(0x7f0000000080)) ioctl$SNDCTL_DSP_SETFRAGMENT(r2, 0xc004500a, &(0x7f0000000040)=0x80) sendfile(r2, r1, 0x0, 0x1c02) 01:59:57 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000600000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x5000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:57 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000700000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:57 executing program 2: setrlimit(0x2, 0x0) r0 = add_key$user(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000500)='\x00', 0x1, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000200)={r0}, &(0x7f0000000540)=""/229, 0xe5, &(0x7f0000000240)={&(0x7f0000000080)={'crc32c-generic\x00'}}) keyctl$setperm(0x5, 0x0, 0x200) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xf, 0x4, 0x8, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000040)="d353ff072d68b2e4dc14aa5f7e25908384") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) r7 = dup3(r2, r1, 0x0) dup(r7) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)={0x0, @aes128}) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$EVIOCGREP(r8, 0x80084503, &(0x7f0000000300)=""/14) ioctl$UI_BEGIN_FF_ERASE(r7, 0xc00c55ca, &(0x7f0000000000)={0x0, 0x8, 0x3f}) 01:59:58 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="014344303031", 0x6, 0x8000}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$inet6_icmp(0xa, 0x2, 0x3a) write$P9_RREADLINK(r3, &(0x7f0000000100)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r9, 0x1, r10, &(0x7f0000000080)={0x1}) r11 = dup3(r5, r4, 0x0) dup(r11) ioctl$TUNGETDEVNETNS(r11, 0x54e3, 0x0) 01:59:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000800000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x6000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000001100000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x283) sched_setscheduler(r0, 0x0, &(0x7f0000000040)) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x908000, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r2) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x84, r3, 0x100, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_HIDDEN_SSID={0x8, 0x7e, 0x2}, @NL80211_ATTR_MAC_ADDRS={0x58, 0xa6, 0x0, 0x1, [{0xa, 0x0, @remote}, {0xa, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, {0xa, 0x0, @random="8d08000040f7"}, {0xa, 0x0, @dev={[], 0xd}}, {0xa, 0x0, @multicast}, {0xa, 0x0, @broadcast}, {0xa, 0x0, @multicast}]}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x10000}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}]}, 0x84}, 0x1, 0x0, 0x0, 0x20009004}, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') [ 766.502965][T26247] __nla_validate_parse: 37 callbacks suppressed [ 766.502976][T26247] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 766.579629][T26249] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 766.652658][T26249] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000003000000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x7000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000006000000000bbff02000000000000000000000000000100000e22"], 0x0) [ 766.905976][T26259] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r4, 0x0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r5) getsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000100)=0x4) kcmp(r3, r4, 0x2, r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201055c080001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 766.959967][T26262] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000003000000bbff02000000000000000000000000000100000e22"], 0x0) [ 767.032307][T26262] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x8000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000005000000bbff02000000000000000000000000000100000e22"], 0x0) [ 767.276390][T26271] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000006000000bbff02000000000000000000000000000100000e22"], 0x0) [ 767.360177][T26274] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 767.424141][T26274] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000007000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x9000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 767.678670][T26281] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 01:59:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) dup(r5) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x63, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f00000001c0)={r9}, 0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000040)={r9, 0x6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000140)={r10, @in6={{0xa, 0x4e24, 0x5, @mcast2}}, 0xdf2, 0x2, 0x9, 0xffffffc1, 0x10, 0xfff, 0x9}, 0x9c) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r11, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) ioctl$LOOP_SET_FD(r5, 0x4c00, r11) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201055c080001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 01:59:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000011000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:59 executing program 2: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000080)={0x380000, 0x85, 0x1ff, r0, 0x0, &(0x7f0000000040)={0x9a0902, 0xee7, [], @p_u32=&(0x7f0000000000)=0x1}}) ioctl$VFIO_IOMMU_GET_INFO(r4, 0x3b70, &(0x7f00000000c0)={0x18, 0x0, 0x0, 0x10001}) 01:59:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000020000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xa000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x9000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000030000000bbff02000000000000000000000000000100000e22"], 0x0) 01:59:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x9000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 01:59:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000040000000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xb000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x9000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:00 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000060000000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:00 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x4, &(0x7f00000003c0)=[{&(0x7f00000000c0)="bd41fffa5290bbc5d846787497546ad03adc292ba4d4b9108f9f593aeb20efc79e", 0x21, 0x1a27341d}, {&(0x7f0000000140)="bf8926f8d81729991a107eafbcc4df7c18a2776770c1b3d23ab05b5842e0acb313e9ad990791258736b6f2ce4de4eb74d308afc8977f0c9d64d340be21df7bd31b8e253416aa7d50e68c9b5d3d904161e967511149a243e5ce14151cdac63794a3b4041686afac9ccbe9613ad3d75d0b70090860e93733f864f0ec065bfb0f2e6195e2c1485aa0db1723b8d6ed254c82e9e87093849802ff2ea3d272d14bdac24fe04312952ca28a57b74836010e5b7d9331", 0xb2, 0x80000001}, {&(0x7f0000000200)="59cff63bfacc2ba1f4b0256e2bc359a925a87ccaa7e1931145", 0x19, 0x9}, {&(0x7f00000002c0)="0e93c80adf8e9a7bcbb3f1c5dd0911add36c8cae84fb00489e07a1dabb010ef94c087c0db982781ae13e28b93824669d6694e9fcb6d36479374e4b84f0768e269875783d1590fd553a9434f7319b104b0cc0f7bb6e53539d42e1aa4007d8f18573466c04d597d2b358b4af8c4455ece7c7bf32aec0c97721c37e70d1ab51c3874650ebf3b7d4ed6178502bbfe9f875bd9f6c222553ec409f564387108e5f615071d5587eb9046c5f883bffeaa47a77c001c000a288aa518436a6a43923d5bf3ee410e6afba28ece80412804795a8c44df3873469fc97e912d030283cb4768e9acb52dfb383bfcd22d9a03de2cdd96532745ff64e5982d702b1", 0xf9, 0xbd}], 0x100040, &(0x7f00000005c0)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r1, @ANYBLOB="64080000002980f56ffb037bf1000923eb94258dcdf17bd9", @ANYRESHEX=r2, @ANYBLOB=',part=0x0000000080000001,quiet,obj_type=,subj_role=,selfwlan1+self,subj_role={$,\x00']) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01"], 0x80}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000000)={{0x14}, [], {0x14}}, 0x28}}, 0x0) 02:00:00 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800000000ff000000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:00 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000002600)=[{&(0x7f00000004c0)="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", 0x200}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r2 = dup3(r1, r0, 0x80000) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000000000000d0000000d07000000000000ba0800000500000004000000a90b621f00000000000000000800000065885241c016dd45b34dc9451d3971405ee334a01e2ce74034dcec5b7a9b7b72809d2095d9efbea0968a8d86d655a7d7fe1a002440bfcea03784dd65e398e93bd45c3e5e03e85592de811ea78888fc4e5f13bf7a43ad36509ee49b5425462b23a4082df1e91d08"]) 02:00:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xc000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:00 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000100bbff02000000000000000000000000000100000e22"], 0x0) 02:00:00 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000001b0000000d18803f775ec9981900ad892d54db2d89b93dabe15edc6f4d7fb683608260ee0d670e0fcbbac6aefe1af382f04050764750391bdc0800599c4fe5aced5630925c826ed024d7572b0332af14fc4c1e3268b60871b470b8ad3fadb6c81d9d2b7a6f94e45de7b23b0f16570962208d2f079e2756a726d150937f5ce0621672996d44af4175a47f107dfef864b9e839ea4b4df8de5ed7e4a8e52af38e02d413fbcf648f0f00000000000000003afbf8c3906def4751db9d26"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) ioctl$DRM_IOCTL_FREE_BUFS(r3, 0x4010641a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[0x93e, 0x3, 0xddd]}) 02:00:00 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000300bbff02000000000000000000000000000100000e22"], 0x0) 02:00:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xe000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:00 executing program 2: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x20, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000950053f9c2a5b3e4a17988eda06a00000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000c00)="480e003f0000007e5bc5795e8064", 0x0, 0x1d7, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[], 0x78}, 0x4004080) socketpair$unix(0x1, 0x40000000000001, 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000000)={0x0, 0x0, @raw_data=[0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0xffffffff, 0x4, 0x6, 0x0, 0xda76]}) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000080), &(0x7f0000000240)=0x4) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) 02:00:00 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000500bbff02000000000000000000000000000100000e22"], 0x0) 02:00:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xf000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000600bbff02000000000000000000000000000100000e22"], 0x0) 02:00:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000700bbff02000000000000000000000000000100000e22"], 0x0) 02:00:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000800bbff02000000000000000000000000000100000e22"], 0x0) 02:00:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x12000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:01 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x409, 0x0, 0x0, 0x1, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'syzkaller0\x00', 0x200}) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, 0x0) ptrace(0xffffffffffffffff, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000b0f00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100636273001c000200180001"], 0x48}}, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000009040)=[{{0x0, 0x0, &(0x7f0000003040)=[{&(0x7f0000003200)="7d46d028238c4197f58c84f5d01f9df073c5a409d0ed9ae8d2c2ac02b6cb0ba1a8876222b9477034a383e9cd0924284e2c7ca1c5dda7828995dbb841080deea5ede18d68bb4984fce0f960b274e067fd76250128f794ca3b849371e1ba93c912b564e53d9194814220a8", 0x6a}], 0x1, &(0x7f0000003280)}}, {{0x0, 0x0, &(0x7f0000003300)=[{&(0x7f00000032c0)="915169f08509f8f52aefc6245868207cf1b209c3", 0x14}], 0x1, &(0x7f0000003340)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @rand_addr=0x64010101}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2c3a}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @local}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}], 0xd0}}, {{&(0x7f0000003440)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000003740)=[{&(0x7f0000003480)="b3f0a15dcbe8164a1d5337433de7464911a8ac7b2df8761f0f5de1b4e6575a989f01aa8756b6fa6bf42d3c5694e0a9d4eee70c9e770715158c61fb157917e7b44c8b34accb0ba0ce418021bc709c1c3ca0aa7022c1c4756e3e1631942ddce66bd26ac3b12bf31eb432e6125fee44ccdb60ce67cf971b71130d815cc8c5d2bb6a98c1b23de025bd4b5a65ad4c964545c0", 0x90}, {&(0x7f0000003540)="429aeef4c71c3b11dd1af9d2297d591f115e9945bba1353bb5c4511d5c2aa6f3c9da4e8ed3004a5b3b560f2fa2f548257bd6489e107511d9a97d5e13d445178549a06a9cd2f99e31c2ed2caccc72d9131192703e9698dcf70e337733560c1f8778f684b2ad3ca27c47bc92c15baa5dfbb89574d51b439f5a1a1bd2d7204c2b742d0e6acc59f39d14331e7d24479e006ed79d7ee585acea6747f87984e67d30654b04ab3f457f0a50b3bab8177968", 0xae}, {&(0x7f0000003600)="8ae145393d7f4380fa067eeb7dc82717de77242972ccd2b97bcd16a15bd9b36285d20cc1110fc6e87e71ce2b96f140019508fa0807535d6b", 0x38}, {&(0x7f0000003640)="23de193cee4ec592f096a5a4fb8e629b76c4296a07ca5d8a35d1065bb433501ac0d99cc1e84c44c491ea59d0ca16b86e4ed84f5081d8c778bb26ef03d657fd688500daaa6198b20fce6420406b0f95be4be1b5c7f7116ecb03a5efec3b8ca7a6f6f4b12f55aeab70b9296d02e3723c709165d71b1fd18da12a168388bbd6905654b265ed1c3bcdd34ba6a4a66d75fd0c913cfbc6e5d218f2761f17a9d6d373302a91f600e16ae02b8ea1c573beec", 0xae}, {&(0x7f0000003700)="db", 0x1}], 0x5, &(0x7f00000038c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @multicast2}}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@rr={0x7, 0x13, 0x9a, [@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x13, 0xe4, [@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @private=0xa010100, @empty]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf8}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @local}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}], 0x110}}, {{&(0x7f0000003b00)={0x2, 0x4e23, @private=0xa010102}, 0x10, &(0x7f0000003b80)=[{&(0x7f0000003b40)="4ecb8582f2474f4b7a1bf64b9466afbcdf63ccd5d747e30ebfcb6eb4e2cfa90439e43feb282fb2dfc81fcd31ade92bcaad1201a893a1d7ac34b7e6ad", 0x3c}], 0x1}}, {{&(0x7f0000003bc0)={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000004200)=[{&(0x7f0000003c00)="113485116072cbc505eca9c59dcbe9694ef3bb6fa474acb7cc", 0x19}, {&(0x7f0000003c40)="61fefa1834d4a9b824fafd904cb20e726a8d4c13770a0001fa3e05af9d692c2ba451a743cd09ffc184a1a24c212f5782c96ba1c855094966c85ed646", 0x3c}, {&(0x7f0000003c80)="23f27889e5205b9dc1cf1f5e5cf98ef6f4ba154b14e96aec97bbc1b776f9af17e87d541c3a580892b4d5187239c6425a08ac529d1766155bd92d8c7237b1ebcd3b60c8e51ab0847952faf4b5c8f8fa047208d4a82ae8591870e7dc30f367db3fd9f3841a91f7213b57c88b100d2323510639cf6dc1b5ec", 0x77}, {&(0x7f0000003d00)="8e09dc5b3cbb218824d5437353e1e0ef39d23c33c2ad77de77620722244e441e2085d0539685dc48d87c6c02f1ef9eb57c92c8a33d6a79dfa209c40f1e6f1cf447993b7bf7780d28f98ee577881ffd34434f10261f7911d80ccc2b1c30b98d3e5d96b68578d667fcb0c31df87f95c9c1b70f69ea76ecc3b795974ba87731947631eb405c4cfcc2c718872743682cafe34ce79819a096fdb302f7c0490fab88222b6e68476416077565027d403533ab626979717cfa944a27cc5ab5bc8fc1974cc9f8e180765602c8456bb26e00ae96a53bae14bfa4a8851d98ff276ee6f718c96deca61187fbf48fa5d5916cc680526e2d5879df9a", 0xf5}, {&(0x7f0000003e00)="574097d0811c796ffcd6321e078c72f7e22435b8ec52477a64b8c9a78c82e4bb1574765cc3954b65e0adda9ab337551b2580fea48ec4a2e5c63f4992901949632b39b9bacd767290fcccdd42be", 0x4d}, {&(0x7f0000003e80)}, {&(0x7f0000003ec0)="a372ea45f33b2aa7fb47662deff8a3931e5bc70a2663f52fd846ecaabec23796d82f326121e03443eb3d5e835be5d2f51922e3420f906f146a0e98db0fd7afa9802e88910641f6f02d0512998eb081d51afed8d1249004b3ec94ddf8fbae1a2c94f3c8cf831fbbba1a56d78195c278798840362de9681916daa925399cce1028bebc514539ef161911d7f8206d690ec0bcb86777f57c82513037c79afea77e20820ba8c73827cae635087bb509dbb9bffb585d3b1326a35129f683e3516a92999f6235f291", 0xc5}, {&(0x7f0000003fc0)="75780f38c494fa8b4b14c680d4ec9c6ab475c8e2ada02f24fad61590401ba8a5d49e253f29c4506857bdffab7e15baa724d1690dce7dbc30daf6243efda009f00193c46c857a0807b281e4dfd3fc1885e4b668ef52c53b16e7003bb744f8a029f286becb2221ca5aba26735081a6b087d97019a75cd852d4e609c099bea2581251d587777d189bbec7f04a7dd89f7d71e8a5133a931d95f95e3afc0c", 0x9c}, {&(0x7f0000004080)="2ad365a5b504c7d9375d4e81062c19d54132f0bdd33258df71f91e0af8e4f9d2038dc76cdccf331ab89ff050c777243072660d99c038f5905128e9674bc4dd159bf2c6347b9df668c7302e94caf2a690124b4c10f11a0c59faf52e04c0a58c971f4bbd41aab0ac1f4f2960fa82bc8ac3b612cb7ad77d2f47688cfaab6cbc82005c0e5dfbe67badc79e0bf2eedefe2dc2ba2ccf92b5e5ff56bc2ed80f6dd9d68f", 0xa0}, {&(0x7f0000004140)="cfb7640e158db1f76f933bd3d328f78d05bc4faab0c1f405c95e448cc6c012669b2305c63b98d97c4ca197f1d23adc29dcdaf0a21f6fe87ec85917c1f04317f2ba7cd295910ca15c7b51968b7f9bd0858b95becfde3f31b2353eb9034778b84fd3023236b1b3542645226f0aa37970bf1064783c5db1668fafa2e6615cc17e907419b9044ef994dd601a", 0x8a}], 0xa, &(0x7f0000004400)=ANY=[@ANYBLOB="1100000000000000000000000100000006000000000000005c0000000000000000000000070000000707f3ac1414aa0717a0ac141424e0000001e000000100000000ac1414bb442c1351ac1414aa00000e347f0000010000ffffac14141b00000008ac1414bb00000001ac1414bb000008000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="e0000001ac14141a000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="e000000164010101000000004c00000000000000000000000700000044a05d043064010101e000f6007f000001050ed85edb3780cd2cf218c429ff01441437e3ac14141100000101ac1e010100e3008a87fc28d2a2e15a70beae0000039404010000000000"], 0x108}}, {{&(0x7f0000006900)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10, &(0x7f0000006c00)=[{&(0x7f0000006940)="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", 0xfb}, {&(0x7f0000006a40)="eeb8b5363578a750485b3479b97e7da2183babfcc548cb89f1393474c9a7ea5c11d9eb155834228c324863f4822c22808d2ae261cfa2e8054253db2157200e489ddf54", 0x43}, {&(0x7f0000006ac0)="a6", 0x1}, {&(0x7f0000006b00)="4d9178ec15c702e090290fba7dd1f5bcc256b52af9e5cb8f2fc885f1b959a8bc59fa832b90eaf208c3afa22c7cc5f2130d0fb771c9f03eacb303bb284f1a2cc1be5c711943f020d5fd5db0235c429be464ba53fce6b783ba6d56bd10b872d28ceb8e3c0737590212d33b7098010f09269cddc16fbbe7aafa25bb60300c9197504dc5faa2b5d151a1d2df22334a8d9e873792d375984c9143ca3a58ed693902b360ed7ec048e70c31015b46ba98e9bc1db7b3ad8ac486bb00eed1ba7c2ae7ec787017e36a85dd7b6e85e1284e3dd150ca38c70939ccb07d7c940282b2352d2c", 0xdf}], 0x4, &(0x7f0000006c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1bb}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x40}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}], 0x78}}, {{0x0, 0x0, &(0x7f0000007040)=[{&(0x7f0000006cc0)="a056f778ec4a1f263b10e1b7c3412d77b54bd8b32ad76d5ed37aa215fc30b1ae1fe7152652dbf8993c74c5b3835714ae0c7eddf01dd550abfcf98d16c84a124a018d515860ecddc1f1a6bbcfa07bfa771a7b49ed83568e5a493bf8", 0x5b}, {&(0x7f0000006d40)="467defb12ac9ead9b3abeecf9ad642bb805c99c50b13a54027f610f067ef720fa7d80aaa89f09d34ada2096c89f8d3bcf2d7dd857de7bf1222c03bb7669df22733dae1bb5669d30cb2c7b614754fb4b78ab10ca596d39a9ec079e86e86ddcad03d1cf7da24e2139bc316b448fa02ad27956c706df91157d89e375a217fb524277f8efd1d3b1e3c47e6d932270c5e221a2235ac0294cb", 0x96}, {&(0x7f0000006e00)="a4a341286541738ff6713378828f7a47b0288a268ac5e00000d448a640d321c3d8a4b8", 0x23}, {&(0x7f0000006e40)="6e3ef3bf80d4caed5f4b3706bed6b3eee84509e34173476eb5cf7bc65ef553de66b8e450f4832043f9f6a7cc0b412bf51dec624ba73e1c38ae7e55ae076dbeb030a50931974c3faa45ac44854220c3f2ac5fcc6ea90bd28544d336d67fba8dde056b2289168bfe27b24fdf67d9e0a59c251362005ac4b5b25c911ebb4c5ca9ced019a2fa3ac819cb24cc76bc226fe9575f7df0eb992e29f5be9befceed6e776288f3fa490db5a0f9367b81e8a35531d7f08b9e4c046bbb326061beb869194ba48007b79fbafb97998e6a72acf36e11f8ee61d77b67573ed29c3464997b0e188f237669ef45ec50e826cfd02e67c8e3662f44", 0xf2}, {&(0x7f0000006f40)="1a64fa00912b1aad67a1f94bc1294f111af70a0be8cd1270682f768771c1a6f4ae013d447836af70eb52d1bc1bbda085e914a4d1cb06f660d0c9b7ce131123d89850a462fa7f8969186cf5bf788db9431f2a6657d4b9658fbe3000dea75b54094a771617a480be27571df4a35a7eb384cf5dae7ede10ab9c323de4f3b477a06606a9d3775e4bd8f5efa8efae7014f052b225a28f1d82c4771cfd25c8", 0x9c}, {&(0x7f0000007000)="44284b6f5a7e15b1b584ec809ddd6da215621803a86989be69c4b133e2e5", 0x1e}], 0x6, &(0x7f0000008780)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0xa8, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @timestamp_addr={0x44, 0x4c, 0x94, 0x1, 0x0, [{@local, 0xfffff5fe}, {@multicast2, 0x81}, {@local, 0x9a7}, {@broadcast, 0x8}, {@broadcast, 0x8}, {@empty, 0x4}, {@broadcast, 0x401}, {@multicast1, 0x6}, {@rand_addr=0x64010101, 0xfffffffc}]}, @rr={0x7, 0x27, 0x7c, [@initdev={0xac, 0x1e, 0x1, 0x0}, @local, @empty, @private=0xa010100, @empty, @multicast1, @empty, @multicast2, @private=0xa010101]}, @end, @lsrr={0x83, 0x1f, 0x4d, [@multicast2, @local, @multicast2, @remote, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @local}}}], 0xf8}}, {{0x0, 0x0, &(0x7f0000008e80)=[{&(0x7f0000008880)="18bbb222e25b152e6d55241a6e3a296c339867dce9400b18ba47c6ce907a0e0de8da55cfb5f142df77ff469fe6c2455fecc655c98306c6abf15e8de1522d4a42f792e71d1ac893eea62b6a97331ec7e9e6c841c7ef733123db23237d3901bd90de2e0504feb20d68f6f4d2d1b4fcc83f2042b322f880ad2dff2e39ee1db7ebccdd12172e0493b8b83500058e654b0782dec46f905a54742b6048f6b0ddee39b447f24aa880134630e97ee0", 0xab}, {&(0x7f0000008940)="7c28903852503376ef41c0b1e1b2caf71e3733dda99f80d05d401f5c1854a2ac0ab1dd6858b863b4074c85b990b4900af6efc03b41eb79af6ec3776439a434cb36e11aeaf0a4ad395be2108667eacdb0ab639d107fdcdd7bf4be3bbb912bb3ba8c0e4347c3396d9137b3d6400562fa451e389ffd5409b76b5b8d07b0ae5dd5e56cc25c92378f4af12009f0d20c01dd1234ebc5e8db2d94318383508823fdce2cee88d2bc8305b2b5e8b2a7b5d1752bae7a63899e632ffc69bef35e6ec4a000a86051f737c38ce2f0f7faa42d5ec9bff178cc3589", 0xd4}, {&(0x7f0000008a40)="5758b568481f6eee5fd99953735101936d572767ecc342e91b60126608023330c077ed73a9f7bd907bfe8009d448556c8adb86", 0x33}, {&(0x7f0000008a80)="70a4d9b766e281944b9f170d57871a4ae6cec24375e9623be211cd2c98030a822e9d281b58a600ae1949d1ce", 0x2c}, {&(0x7f0000008ac0)="3b890e1d9588ec00fddefcba7b61c0d887d395212254c28caa1f61373ae6c98431ae94d6e2ba4622972584627040b4eacdbb613e03ae57ead045b4d65039d68e505bbb3aa9c70f908eeb2f2d29a5eb3f0c34e13f72fea38245d70bd797253dd95f24e6b8be6ec124a2b55b5620ab3424bc57e440d8064385de6661c7e45507ccd040b0551badfbf17a4d700882783b243d551b0eb6492b4c07797e25d06efaebcd448c045064938b522c6ff9024a14f629719c39a1d12c3b916cc9265bfe52d283f661b10546dba8cff2a761e35310962631be4e0cddae0ed94607", 0xdb}, {&(0x7f0000008bc0)="7a60a8e06c6d18d7a995a38ccc4c450c85c108689eb98f218700913f76c98662980998e77aa5abfa1d1690096dbdfd2f61e98c187748d1dd7a37a87df143ea65e0a16f65a7114ab28c15ddde955078fa98aa37fca5b20e1697efc218f6e2a28f9ccc3e6f686bf0e117b0a234f9bb23d5f26643e065b2296903507b079a9df1a10924e440ff17208ce99427f31067baa7aba4c32dd5921b5c7e410180314f155c66c5507012714e1b4e06be4cf7997bba960d2eca85ce8ebbab4ffa31b9cb968929ea82123a87d012db63dc516a9e2ec141", 0xd1}, {&(0x7f0000008cc0)="56c0f0154d6eb8e75df27d53d237f4f89d8ac1748daf404321b2d802b42447afa4db148ee43ed7cc5c655542c1d53726da1f9f0314729bbb37fe7398ffd82a67d2e4394e6152fed6e42402ae55a42ff6c77852e395d90124accdf0ed4e5b4c8203dab81202204ac1c9e5aa70d859a71d9475c8dbb1c38c1408ccc9793c0c11133f5f782c3321617cf5a3a70015e29105bee928f779d3d2d3e5227aa69a1efbdc9883c496e1c5c9ec06c8d4", 0xab}, {&(0x7f0000008d80)="ef51fefa3a1669002e78c216ffb27990f87a61226ce31993b3892a4b4d842cdd535804b84c627f166785e3a18fc9", 0x2e}, {&(0x7f0000008dc0)="b2ae151fa6051f4c732248d35149e668ea052e969d4b3a3b2a5fe37081c9351f6452ac857495213ae82901c36b9ba12bd363152eb13aef24133d7e9eb1788f8fd938759104f96b15a20a0607e0ce8464f705c0890f7f5f8b47d5dfdd9166fe2a53349068cb501bec19e1076d6d83cc1cb76b2249cdd9b37e6dd0e66f17a47f16cb", 0x81}], 0x9, &(0x7f00000042c0)=ANY=[@ANYBLOB="1c00a13680426e799a312bca5d0e938000000000000000000800000043e12128f83677b7bca1fc838d93b23e79b03609881c28156b3834c65a8df314256be10d5b3259a6eefe7f65226fba8622", @ANYRES32=0x0, @ANYBLOB="e0000001ac1e01010000000050000000000000000000000007000000863dffffffff060adfb2c1f3d4f586b2050ddc014b4b43f4eadaeb88b20208581050ae232b000949f0e0bf3e2673060f1e52fcdd9c205aa96fafe5779d000000140000000000000000000000020000000800000000000000140000000000000000000000010000009f0c0000000000001400000000000000000000000200000080000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="e0000001e000000200000000140000000000000000000000020000000000010000000000"], 0xf0}}], 0x8, 0x200400c0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x200}, 0x14) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xff01) recvmmsg(r1, &(0x7f00000030c0)=[{{&(0x7f0000000240)=@l2tp6={0xa, 0x0, 0x0, @private2}, 0x80, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/100, 0x64}], 0x1, &(0x7f0000000340)=""/219, 0xdb}, 0x8b}, {{&(0x7f0000000440)=@l2tp={0x2, 0x0, @private}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000005c0)=""/185, 0xb9}, {&(0x7f0000000680)=""/118, 0x76}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/215, 0xd7}, {&(0x7f0000001800)=""/191, 0xbf}, {&(0x7f00000018c0)=""/66, 0x42}, {&(0x7f0000001940)=""/154, 0x9a}], 0x7, &(0x7f0000001a80)=""/76, 0x4c}}, {{&(0x7f0000001b00)=@generic, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001b80)=""/240, 0xf0}, {&(0x7f0000001c80)=""/137, 0x89}, {&(0x7f00000004c0)=""/2, 0x2}, {&(0x7f0000000540)=""/29, 0x1d}, {&(0x7f0000001d40)=""/36, 0x24}, {&(0x7f0000001d80)=""/42, 0x2a}, {&(0x7f0000001dc0)=""/236, 0xec}, {&(0x7f0000001ec0)=""/223, 0xdf}], 0x8, &(0x7f0000002040)=""/4096, 0x1000}, 0x1ff}, {{0x0, 0x0, &(0x7f0000003040), 0x0, &(0x7f0000003080)=""/59, 0x3b}, 0x7fffffff}], 0x4, 0x20, &(0x7f00000031c0)={0x77359400}) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) 02:00:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000001100bbff02000000000000000000000000000100000e22"], 0x0) 02:00:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=@newtaction={0x60, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_tunnel_key={0x48, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @remote}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @broadcast}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x0, 0x0, 0x32da0}, 0x1}}]}, {0x4}}}]}]}, 0x60}}, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) 02:00:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000002000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x14000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffe3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0x11, 0xffffffe1, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff, 0x0, 0x177, 0xfffffffffffffeba, &(0x7f0000000500)="361237f4e232259f4c6e2de2fd9cda0bd451b461867c1a582a094e5dc308690b0887bd5327acfc57f90478c4e13dce23ea23da90b15ff4261a0bd20215d45f1b96fe3343c05151e70feacf4aad396df338723b17c8b9e3e8843e544d4926539c18d1bdc9b9a497eaabde37dbe016452a66cdb9d6c0f4ab124b79de4f57141e01e5e454afb7cc9a1727da6d436de03bf9c9e5065e3ed1213a08a197b42f4c38adae5927f503c7c870e3461a728698cbf593a5da83a14256a2a7e6c55ebc330c6bd7735c0ad125509f55c681e0fe2ad9c717444eba9c98e00000000000000098458921ccd96e964c744ebad1e5924d719e86109c6c294bd7cc3823d5816dfe9b025afcd019bc76121c669b124f0480dd48339a833a067534ad6c8b4638b5d9c8b48be342c337c71d2f317df7f4602406a3bf3b017a7dbf1af5600ebe106d26c327f33ba8289c7ccaf6082a8f662d83bdaaf7e223cb0fcef80c3f53715c3b9bea014a704348c8f61d5d5fb50000000000000000000000006aee834fb1d5008db3e80c992fdb918256322b54b66642be196812795f3268a103f446"}, 0x40) 02:00:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000400)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x14507e, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_elf32(r1, &(0x7f0000000540)=ANY=[], 0x81a) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 02:00:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000003000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:02 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000004000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 02:00:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x15000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c000013a2751b58c81b5400000000000000000022320fc4af566faa73abd40a4d1e9fab", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) 02:00:02 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000006000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:02 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="c800000010001fff020000630000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000009c0012001000010069703665727370616e000000880002001400060000000000000000000000ffffe0000002140007000000000000000000000800ffac1e0101080003008e000000040012f80700aeb7a40000000400120008000800000000001400060000000000000000000000ffff00000000140006000780000000000000000000000000000014000d00ff0200000000000000000000a4a2e6a00c000a00aaaaaaaaaa1c000014757c6d63098e6ea2f71a8e51f2cc9fae"], 0xc8}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$snddsp(r3, &(0x7f0000000080)="530d790e432fe0bcd3840b3a75e209a29b54d9aa4977dc72b10f72e537d990170b1aaa247536c35dc83e8dc6a8255efc6dbae2338427aacf4b58480ba72fc56e5c374cfd38ee11fb90d1186520e7ca", 0x4f) r4 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r4, &(0x7f0000000000), 0xe303, 0x0) 02:00:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x16000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:02 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8000000ffffff8d00bbff02000000000000000000000000000100000e22"], 0x0) 02:00:02 executing program 2: socket$kcm(0x2b, 0x1, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000100)={0xd5, 0x0, 0x12}) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xc0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7d, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005e80)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000200), 0x10) listen(r3, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, 0x0}, 0x20000080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x8000000000000, 0x1}, &(0x7f0000000200), 0x0) setsockopt$inet_buf(r2, 0x0, 0x11, &(0x7f0000000180)="288ecb9335d6133ad74575abc2a22c430168cbb6897c4348b046b90800d79dcd01c607edecee3da7f23e5bbae77a97ce138c2554e150005602114c53da222b94eb6ea7ac63970b9e838e53fe1c1691ac7c722749f23b39368b6dff5fa7befc20cab21932", 0x64) 02:00:02 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8000000fffffff500bbff02000000000000000000000000000100000e22"], 0x0) 02:00:02 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) ioctl$DRM_IOCTL_MODE_CURSOR2(r2, 0xc02464bb, &(0x7f00000001c0)={0x3, 0x10000, 0x7f, 0x101, 0x7fff, 0x10000, 0x87, 0x78a, 0x2}) wait4(0x0, 0x0, 0x80000002, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r3) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80840, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x64, r5, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3f}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x993}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x400a804}, 0x40) 02:00:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x18000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:02 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8000000000000ff00bbff02000000000000000000000000000100000e22"], 0x0) 02:00:03 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000008dffffff00bbff02000000000000000000000000000100000e22"], 0x0) 02:00:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x19000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:03 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8000000f5ffffff00bbff02000000000000000000000000000100000e22"], 0x0) [ 771.519848][T26411] __nla_validate_parse: 41 callbacks suppressed [ 771.519858][T26411] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 771.614852][T26411] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x20000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:03 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000003000000bbff02000000000000000000000000000100000e22"], 0x0) [ 771.857956][T26418] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:03 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000005000000bbff02000000000000000000000000000100000e22"], 0x0) [ 771.929327][T26422] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 772.021561][T26422] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:03 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000006000000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x3f000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:04 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000007000000bbff02000000000000000000000000000100000e22"], 0x0) [ 772.287003][T26429] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 772.369457][T26431] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:04 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000008000000bbff02000000000000000000000000000100000e22"], 0x0) [ 772.441315][T26431] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x40000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:04 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000011000000bbff02000000000000000000000000000100000e22"], 0x0) [ 772.663132][T26438] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 772.749405][T26441] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:04 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000030000000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x47efff7f}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:04 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000060000000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:04 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000030000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x48000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:05 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000050000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:05 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000060000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:05 executing program 2: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x4) mknod(&(0x7f0000000200)='./file0\x00', 0x100, 0x10000) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2400, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='mountinfo\x00') r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r6, r5, 0x0, 0x20000000000000d8) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r5, 0x40086425, &(0x7f0000000180)={r7}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000000)={r7, 0x1}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f00000000c0)={r7, 0x34}) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f00000001c0)={r7, 0x5, &(0x7f0000000040)=[0x3f, 0x8, 0x6, 0x6, 0x8], &(0x7f0000000080)=[0x2, 0x5, 0x4], 0x2, 0x5, 0x1, &(0x7f00000000c0)=[0x8001, 0x9, 0x1, 0xa3, 0x3f], &(0x7f0000000100)=[0x3, 0x20, 0xeb, 0x9, 0xe5, 0x2, 0x3ff]}) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='cifs\x00', 0x0, &(0x7f0000000380)) syz_open_dev$tty1(0xc, 0x4, 0x3) 02:00:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x48efff7f}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:05 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000070000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:05 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getresuid(&(0x7f0000002680)=0x0, &(0x7f00000026c0), &(0x7f0000002700)) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r5) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r7) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002800)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0)=[{&(0x7f00000001c0)="ffcd7945a1202c5b804c8971c5860f29b2f2b9105b8d3dad00b5c3f1e122853ab79e854adaf6aff598eed4f04c8b9f8c2cc68c7572923a75e2de18d1cdf7fd869ea9c02e818c1d6faad98cae4d08fce2d5ccc912fd9f7e489e16164170118c1c36de58ade0a9e7ee0c96561cb8952a9b3db3838552db78a17496331b15dfef31970ab6d690f6ce4b7ebf56a4ae36922ba97c53d0289fefe0db331a5c0b41170d2b29c5b635dc77fcbd40e32a58319fb6d0b1e59bf48be60719d8bee80f77502266fe9a302b8076801d5470b1b037", 0xce}, {&(0x7f00000002c0)="a2854a445348335a0620eaaa1da5f24dd8b65293aa109ce0d384076b8a523d62565451b0612ab3975df92f9acf0a0badc18e0f024abfd28cb3609d38e03a7e74cae4323e7d99472e56db126962a6f33cc1d2aaec67df6d6e993af72ab8a7a702b247dc502f7f4d78029e3a736516bb1ed27e5f5f5845866f3e9ba6682315efc93240838627b4d833e5efd31ac1cc", 0x8e}, {&(0x7f0000000380)="019aa3efd8f3eab1f36ceb3765a43b1fb1026057debc4074dc098c7f82bae2511ef529cf9b437a1b41abfd0bec71f130d50f7dea1bb12b457416530ee1ab8adca64a7ab3a5ac4f546ce1819f2a10480fbe55c7784ea0d1c2072bb1fca9412f01764f957bea781b39951efbb14c42c2fd2fef4765f57d75a798e71da569529152525cc8125dadc80c08d27ce94f987f959da2652aa23d834c7e7ac13f7cb65e414433d89b319f38667e3a3ee1f4bbc1e1b93a1a62f7", 0xb5}, {&(0x7f0000000440)="4538ff0416eeeb7a3a409964dd3743ba48729b6ab260733aada9e47836b34d658da4db22665f04edd9993c492e162a7565b3f6ea3d899e44b33499301ca15f81b4401a37f114bc4378e1a4b3823524bd56b55929eb7e5dd5c65d27e19dd9a8aea3d48e70721c43c06a8bf90f4d76ab1564", 0x71}, {&(0x7f0000000080)="0caf816fc7918763457e2192ed0fa3fa928a1bb25f569c9b59c58bb8f4c11f4ff0b77853efa3eaf8fb44c2", 0x2b}, {&(0x7f00000004c0)="f30ebb60efa1bd9fffae665a3727dfc0c0db98e6f4b287c92a0e1c5f0f4e55aafdebe3e34c79d4bfe516b0743dcc4b461eb0d112cee5227bfcb7f239e1e268131493f77bc2444bd27fdc27607d6677d7ac61f54c6843dc38bfbfa24b77f64e8eb18e045aba5b11e4bb90e314ded923f66f16d4a49171c57f93e297373d64a4f390405dff392a8c4053f5151786d16cf82e2d60c8b6593e8afb67fdc57423a5ff8300f6ea4a2d54b57e5803a855c01fec2054b566dfa176b65f3dfab08bffcfc017001c273f307fb2c4074f0b73e2a6cd8d361775cf8a9dbabb785dc579", 0xdd}, {&(0x7f00000005c0)="8dabe72a82ffce26e9cdeab5bdbd395632b8ea5cbd5b36e57e51738dab7b8c0e82ebba0c6d7aee9392c2ebe6f5b6d1821558b3f680a0a41df7dd6ba7ce14306c3f42967a3813a8b099c651977b50fa52b6e95dd513228851a900c7dcb9b2e39f55005b5bef742f9d2ea263418e4ec4eab23ea4408a819a124acd7df823849228d355a2254edf9372b4a938be840d144a40fdd1c657e94b5949b10e59bc76c0419cd96865f6e3ce8d91f1906043453620dddfd9dc94d6ccf26bf6329863054b2d37abe4be0afa8d17252c07352bf35de3e177bcb7cb0368", 0xd7}], 0x7, 0x0, 0x0, 0x4000000}, {&(0x7f0000000740)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000a00)=[{&(0x7f00000007c0)="8f62ecd9642afbba9d70008682f0f3951c62a924da04e98e873bdefd46c2cb34856f35346756066f4a3671fd538d24cda79f353dda980086984a0130e6376d6a18e133d71674309c9494988b60f38775f6b7ea2c9d2c445416bc333cc5974bf217", 0x61}, {&(0x7f0000000840)="2f14df44732a685f9d4d48747887727825ed03c65394ad7302ef46b7d4afdf1719962ae626a7242bb7f86e9f94e1472099c1b127b51f034552046c3c97d7d5a9bd80d109470cdab7123523e11e3f2ca9306ffa264b2608bddff16dec364a185eca45832a7142ac594ab4d45b9c21e0a94cce9257b0ffdadcf88e2df74c02e7334cd7c8777f2b7a810f71e6d27613dde824fffc8ac1453d916835c6dbd411a69875f2b274b1", 0xa5}, {&(0x7f0000000900)="02ac87c99abaee2d2d5a3f13416eddf8b5af50bc4b76a1331f4101ae02aae1de8047b8b57eb3c4ebb2c05aaec50a565e1ea7428aad4816ec9c1892b112981ac248e65495aa4861e69c1dc43b0f773b6618960bfc448155a5e7168a0acd600c0bca717e767417b8258efdfe94013063bf925637a532d3bd57f677619071ce21bcf6eea952254e9e72aadc8110dcdc78a7410fac652034866418772c58f6c9506f84959ae774ab7f854283d2688498072c6efc92f9f440c87e533137d6e0fe09a712df4dc9dcab7a", 0xc7}], 0x3, 0x0, 0x0, 0x20000001}, {&(0x7f0000000a40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000ac0)="452c9559e7f61086fc8c40c4c20c43ad2a605e3632d60d554738067f2d429e2bd1b8df342a678212b7f7d830a4e285645e7187e198238cd87647ba0a3060940fc64603b8594c4836daf508c4c0f703708082", 0x52}], 0x1, &(0x7f00000011c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000a65b000000000109004002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x88, 0x4000000}, {&(0x7f0000000c40)=@file={0x2, './file0\x00'}, 0x6e, &(0x7f0000001100)=[{&(0x7f0000000cc0)="ca919056d01c0949269134c64ceadf0df7ad40564193028a9caeeab5bec15411961cb3de85e30aaeccfd7fc877584b4d188f07cea6426495fa70fe5f7a1ae515f2f8e8b04387ccc5466468abb2a1f08cec9b2b", 0x53}, {&(0x7f0000000d40)="cde5e02298c8", 0x6}, {&(0x7f0000000d80)="076cbad86a0e", 0x6}, {&(0x7f0000000dc0)="9b87f74eed3d587737676f6ec4f2f0aecef7049917afb722d988afdb4da3a51f92703e523b3b1d671d8a12e74454254d5c157eaf", 0x34}, {&(0x7f0000000e00)="57c7fec4b407befd2a848dfd36900bcfd4fd39ce57880eb80f9da604d2f7456cfd1d6e2c16d41022ce07d7eed8c64e33551f35c8637636a72f40503eca5d49e8ff025b1cf20d9a5dbe011a", 0x4b}, {&(0x7f0000000e80)="bbfcbd0a7dfb6f4edb3c8643cd878abeb94d6ea92f89862d61e22a959f21c67344881b869f0bfa2d49d32c9599406830e30c9bb99512b3c6c6935478768b5d697eec49bdaf6b24aead592e6f460b76795c2d51801e8416ae2a28624f1c711385177f2c53f459e028b2a9e9593187e9381c3e16ab07024c5ac93b9d67c845c96b07e7cb64e03e153b0b50627c6c661d076f1fb67c28ed9c72bddc635159490072cf0ab1467f15ca794efcc9c910281fb3f99d155f6bba6dd1790be0ceba3abe30adb06c1ef9741f039df447ba7e6b618f6de597675558382837a2fe3406", 0xdd}, {&(0x7f0000000f80)="fac97cf2266827c2cccaf3627920578e3d76ee3d539a42e2b9bc6a63dfee75601c8a479fb6258471a02acf7e77958f5734073282a7", 0x35}, {&(0x7f0000000fc0)}, {&(0x7f0000001000)="74780e735d8564e406d8c42eac13cc566377505b0a441413ef8442bc9520f46f538456ea84158f46423800e00716f3cc8d313df975d00d7d10e43962b46c96bba29071761ce564fa4743389dab82f7e948dd80959d446b4abee34a2afd32fbcf7b8df8d3d3182a35c3ec5d43e05d54d74b527e038bc0197de818bfc3f946ba1d5ffb35dd7552bc374684f794dfd653d7d34fb9c31a57e5fda92e3059524514432e31bbdbc0a3868ab18b9818749e5eec036783264e37b41c26f663839554d18fcfb2cc589fe8e51cfed6c41c2a18e571f5389fc5a2ec1ca205a201b6ca67eb5d63a1cb", 0xe3}], 0x9, &(0x7f00000012c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa0, 0x4000}, {&(0x7f0000001380)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001640)=[{&(0x7f0000001400)}, {&(0x7f0000001440)="98a8edb24f59ab2cc3bfb0aca33ea2382a52eaabb9ef2c52cacfb28297d2ad277e244b8b992cc800ce6d6101049cfd3f1babc7ee76a137fe3900f53e2d5fea0600364690b32b15731d3ed21ece89a07530bf3165b850fdade860172142868748df886e7112b47a003a01fbc11bee9c8790ace6e5acf9348c40962e1f513d76f023b7f9150590920dedeaaa555ab27948ff72522791a9436a8831e2f1083b5a5ca3ddab26273b72c1a63f936ae700e990357a8412fb66a1926d4c70479599a43e55e3faf6559615342f0a30338509b3c55e39e5a17995240e982aad096d824de6a37099af4eb8", 0xe6}, {&(0x7f0000001540)="69b024f7a5e0d9ea1da9cc82dfbe81c5cc7d0cc1f1c50e2d8eedf433b68160be25fa53c704ed1909bd358533819ff3290a47153b1bc8cb80f0436fb81034dce11b57be93486dae073bf580cbc31d074d18fdfcdd2fd5d8b20249c472184e737ed6c3a5a6ba60bd87ea82f78fe4e848072255e50645f6bf5800b69ddf1a395569483539e74c4682ab5c3443e6bb62ab3103a133c3944cc5dea1308d460d636cea83190547931b1fcc8c4dadd778797ed79f79375a5c2f63f636f4a4784c8b3fe7cfefc45c5635df8246b144df7e5f2755f768ed732a3e3f45498425996948feae4043795bad19c2f21f", 0xe9}], 0x3, &(0x7f0000001740)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000001b70002000000000000100000000000df", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xd8, 0x2400c005}, {&(0x7f0000001840)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001e80)=[{&(0x7f00000018c0)="76a2b4a28c13963a5c62c91a330a814785c4af4579968953eea64e154ae325363c4a404de7dfcb2f0e51ff2a6a5f895bcc3c655b9e73cd7e84d07b6d8c17e2870650", 0x42}, {&(0x7f0000001940)="8d6db97ddb89a23ff11003d9b4a1e8dcfb750b75fcabc5cb28b16b15068d6f19024220b212edc2338e89608e568c61ae5119ba19d38ead152ca04da1a38cc351f4fcbb92a38695b08cff6f6772d0aab0fac1281788555601bf92860de6c260c63b961d26df5d4ba53e8e3c9b7916fe83e38e43feb0e61c508cd073316da0d4a254733e5ea559b47c269269e5be4e54b2cf0f2ca1de629f3acdd22cf02122ee64273797a334071cf4178280a321d30caf3e1847dc59e192b32c4ad95f053f3329e2374d7ba5a328c504d4bcd3", 0xcc}, {&(0x7f0000001a40)="b1640a396360848575107faea01666e1a974640048c37221e8c83a7637a57f8c00aeffb390a47c745dd18653a3fb1be8897807de35446886ba37b977c865f59fc0174990fa0ff9bc9618674e38793703c65fcb86bce0a602963293fb24bb67e64eb835e13b5b344298d8261f7df2034fc35170033256ce45bc121dc3ccef34574a938cc6c3409e015e393f76d4ce2e474d283a3728282e122b8d4096", 0x9c}, {&(0x7f0000001b00)="bc371666e0c281cb636ece6f65e4ff40e4a45180811d66c641817933f0a59465a88c9b54d45999eb1a76eec6e60edeee7ad93ab646ac4847e2267c397477dffc11712d975c5477779e83ae4ad51ade9ebfbe061d5653097582463e43e14c7799ed8d60ca2be5ed47f4a9f2a787527d6d62139050a2df69fd1768e4b5e0ebde287a08d1f8ed21eb408482730c9b5caea64d7118ef3b6798b2a9c02c84a0a70b6f864ce15efd900e572bd85e7a301a7d0781b35752a6f3c32a2dc7175fed13e8bfb19950b3ba2c0bf6f0e5bb69cf4565084fc619e743323b869fa22134f25be24ea1c2", 0xe2}, {&(0x7f0000001c00)="d4adc45b5d9e9a2414dab200e4b74d09a14ce2ddf36e3d192b75b70b42c333b033d4eefa3bddf9569dc961fcbe7a3619f3b044fff2f72ffebc7160ef35be0c9a54ab14dc6e21c6d4933158b79d8956e777df2e9ca6755e2e58df899e759b63cecf029e49a1b902465b3a3fc24c074abd3bb1c31ddd12eae54e31dd21a24d491c073a26c60e17b1754eec4b3c42019e29d03fa2c41a3c5b8d45a1d11f3123bcf280410938e43a10a6010dcc8ca240689c212907359c05f3b0bc30ba568b8a5fcc94492b66d50a06e4a5e73f9868832fd9a333361d30ad1b4dc2271ab9e6bd90b50677499f3d46c6000379ca6825fe50fc7d9f2ddf", 0xf4}, {&(0x7f0000001d00)="a075c5f108fdc6cd77e8aeafe3712974d7ee76cbd71aca6f05393c347f921616638a097972172e4847189b0979f55abd7592", 0x32}, {&(0x7f0000001d40)="6b0d49f091d9d6842cced81d1105b0afb4f45b727527f3dcd71917acf0bfc02440a5c13ef123f1d0ee8ce593c3c889a24a294f1a2715e08dd5e5ec32fc8726d6c7b0d28cf6fe14cad6e2503e383ef677d8b3e80d3f061531eb4c77cfe58f15817323cf6783cd7ba73f41085609b495d8d896d5f7c3bb5918b2e1226a6b", 0x7d}, {&(0x7f0000001dc0)="5ae86a693ac7232fb41eaf8885fd1f3db9399cbc1399c88be3e6db0e8e5aef795da9e1b3d50acb71a419eb525b3fd4ccf933ae14c7ea27df0fd8346dcb2f8a2d49365f6f1f048fb283f326b1de2bf4d2391deb72e7bd24b052c4bb8e4f1b126321ed0134109b576f10f6c91ce35efd17b878c7ff1491670ddd0c4730e0928b2cca69d43b0b43c8d0905547d05e511312cd1ec776fc87c9bc40969e1d821a5477c99c388eaefbc795fd0b0c", 0xab}], 0x8, 0x0, 0x0, 0x4080}, {&(0x7f0000001f00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001f80)="f1660af2d3fc12fe17a8b4936999fb600561e5f84fa7cf39ee08993ab5f20fccdbbd830608291a4a3340457e4b4080bd2312", 0x32}], 0x1, &(0x7f0000002400)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x130, 0x800}, {&(0x7f0000002540)=@abs={0x0, 0x0, 0x4e20}, 0x6e, 0xfffffffffffffffd, 0x0, &(0x7f0000002740)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r0, r2}}}, @cred={{0x1c, 0x1, 0x2, {r3, r5, r7}}}], 0x98, 0x1}], 0x8, 0x8800) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000100)={0x0, @bt={0x3ff, 0xffffffdd, 0x55db0a047c65d21d, 0x1, 0x6, 0x0, 0x6, 0x9, 0x8000, 0xf8e, 0x3, 0x4, 0xffffff8a, 0xcd4, 0x0, 0x1e, {0x2, 0x404}, 0x1}}) socket$inet_tcp(0x2, 0x1, 0x0) 02:00:05 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000110000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:05 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xca) mount$overlay(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='overlay\x00', 0x241030, &(0x7f0000000280)={[{@xino_on='xino=on'}, {@xino_on='xino=on'}, {@xino_on='xino=on'}, {@xino_off='xino=off'}, {@redirect_dir={'redirect_dir', 0x3d, './file2'}}, {@default_permissions='default_permissions'}, {@xino_auto='xino=auto'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, '*}$securityeth0'}}, {@smackfsroot={'smackfsroot'}}, {@permit_directio='permit_directio'}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) mkdir(&(0x7f0000000040)='./file2\x00', 0x3b) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) clone(0x44040480, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file1\x00', &(0x7f0000000000)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="58000000100005070000000000006b0000b70000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800c0001006d6163766c616e0014000280080001001000000008000300030000000a0005000400000000000000"], 0x50}}, 0x0) 02:00:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x4c000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:05 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000200000bbff02000000000000000000000000000100000e22"], 0x0) [ 774.083084][T26480] IPVS: ftp: loaded support on port[0] = 21 02:00:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x78, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x4c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth0_to_batadv\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vlan0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xa0}}, 0x854) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_DYING(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x6, 0x1, 0x101, 0x0, 0x0, {0x5, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x40051) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r5 = dup2(r3, r0) sendmsg$NFT_BATCH(r5, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_DELSETELEM={0x38, 0xe, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x24, 0x6, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}]}, @NFT_MSG_DELSET={0x70, 0xb, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0x3}, [@NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0x29}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_DESC={0x4c, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x80000001}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0xff}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0xffffffff}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x6e}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x5}]}]}], {0x14}}, 0xf4}, 0x1, 0x0, 0x0, 0x808}, 0x4000800) 02:00:05 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000300000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x60000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:06 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000400000bbff02000000000000000000000000000100000e22"], 0x0) [ 774.402320][T26483] IPVS: ftp: loaded support on port[0] = 21 02:00:06 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000600000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:06 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000001ad40)=[{{&(0x7f000001a740)=@generic, 0x80, 0x0}, 0x5}, {{&(0x7f000001a980)=@xdp, 0x80, &(0x7f000001acc0), 0x0, &(0x7f000001ad00)}}], 0x2, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0xfffffe83, 0x6) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x2000}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x8, {{0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}, 0xffff70f6}}}, 0x88) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000300)="55fc9404ec429b78e5141a") ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe, 0x0, 0x1000000000000}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r1, @ANYBLOB="800000006800000000000000000000000008000004e936b2e54e0fc7744183366619ca6d40d1d9765863c200000000000000"], 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x411, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x6841}}, 0x20}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@dev={0xfe, 0x80, [], 0x19}, 0x4f, r2}) socket(0x15, 0x5, 0x0) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2715, 0x0, &(0x7f0000000000)) 02:00:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x64030000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:06 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000ff0000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:06 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f00000000c0)=0xc) r2 = fanotify_init(0x40, 0x101000) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[], 0x9b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) [ 774.829033][T21194] tipc: TX() has been purged, node left! 02:00:06 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000001bbff02000000000000000000000000000100000e22"], 0x0) 02:00:06 executing program 0: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x37dd, 0x8000) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x1, 0x4) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) perf_event_open$cgroup(&(0x7f0000000240)={0x5, 0x70, 0x8, 0x6, 0x7f, 0x79, 0x0, 0x902b, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x9, 0xfffffffffffffffc}, 0xc07e60604c7d95e6, 0x5, 0xffffffe1, 0x7, 0x90ac, 0xffffffff, 0x4}, r3, 0xa, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x68000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 775.036879][T26560] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:06 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000003bbff02000000000000000000000000000100000e22"], 0x0) 02:00:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0xf0b2) socketpair(0x8000000000001e, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$alg(r2, &(0x7f0000003240), 0x492492492492619, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 775.077052][T26563] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:07 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000005bbff02000000000000000000000000000100000e22"], 0x0) 02:00:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000440)={{0x0, 0x0, 0x80}, "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", "9e2aba26f841dd44051c8568e62a60de02271674a6c0c191b3fc7e59512d0bcf8d8c81219af5b3fbf81bd15e1a935dbc76c259dc696b77075e5334b4bd42399599510fe490086c1ef4095d712fba38a2f16f04334bd4bc57442e025af828b9204571d040202067e6b35513760ed685002026aec6af047aafb9d987647a7cf0069fbf9d81e0e181b5f7eff562a086f80a9373ebab70c9df6cdbee746c46bbf39136ffd37e56c33bad2d8cb8fd9121c9adb430f87540321eab920ab8553774c359625d0d14f010c0f83d4016bf7c5106e38613e6890b13892fb81e86d5b419d077a3ee5c8afa9981ac4b1b42c088d1eca26727d826067d03a1e132bd28fc288c4a1815ddaade37f12ac564836073f58788b5efa5052cb99da6401376571f93aa360084bf5d9d4b9838b48935a13ed35e8aeaeb7d00374746136ad27a6920d1459166664ce1832ecf94981670f3ef73f562a71b711f9ecb94a8332d7cf0b76a50c4359db2be9a2b92643b1795193c86693ab81864528109376df85197db0d1330f7c9f66f2e13b402cf81b66a5f58558b8e6951fee1152276b49eb783cfae1178cfd8ca89af53276f9635fc2f6196fc263dd4286a8d2cc364a8d0c105e3187b2d639b7f6f74e155a251c4447dc575436a35d3b153ebc5b577c7c51a010f01c52dbce9f1e5d1ffb9f6a1488728d911fbe079cdf0297ea19f573706856c0129e93f5446532c5bc26dacd37a145a956ad126b5fff213f50508671c2863ac56adda22ae212eb1486243cf0b7e8f600d339d02fc0336b3ab331194f0fcc3fb269a07f99fabb8a2e90559c017c267d65dce8cafbd3d465664828eb3d437364a26cafdee948c62426a617c0f9ac4b895621b174953eb4c11587e5cbd4561b971e7464856f6c63939fe4735052f88cab0b26e6acfa6b922d3d8998bbc6022b56b27a192ea24e078368fea82416abefc28b389e7b3693fddfdd584107fb3c538562789501d6caea5688aae94aa18fde43814ba9e7b4e8a4a461e785b045b2b4ba8f84265490af5703233cd476a6eb6bb7da196f9d0c130d49d559ade25d28fbdf36f94048c1778a06f7f41dc4c85c3bf82fd22f397f4853fc86c8ee1183edd3369920a2d2b88130c060305c601a55d3f2328a8b4bea9c108b7bd5cec73882a046415260315a5ea5fc0ad44b4bde00b3f8483f886a960c683dea86709faa2497f8fd3865bd7c8d21af0349b74b97938ba96bd1b5286a38331686f23fe2250ad3a10b4f6c54e4ad7aaa9aea4179471cf965aafbaa5d240e2433a70458e4870020334d083b4fb360d05045707691f557693a95a9b97f492405197d45a7e2b74973aeddf1dd9abe907f19b98001674bacb5a5293aef28ad58412f7ea94e501a26995bf4527eb964545fa785ad37b2b861295aa004dcef4b25cf452475643fc09263a8a2cb30fc9a88cb984f17d09755bcfbe1f8a6bbb426140e32d9b42a5851d46c9a29b7850573373f4b3aac13033dc825bf9ded67563fe3966f8ccb87c8dc7c05e4e24eed570a79aa7d9b776528dbb0f52dd7610077de29513dd624d9cebc3667840ae6d37dbf0b4f3dfa11513dc75b6a415faa4ac11d6bae50ff63d0390e2dce41044983d00a8d2357acbb3f30aa0e00e484352f8c251808a56dcc039079135cabdf5b6b3447ef9842c3fca06a50bd7d961035d3371387c636a86e5ba3d568bc0b97457892b81f483bbf8516a18ef2d2d9d08f7662d9735194a1af5be5cd5743c4299db04e9500fbe103e209914896d19472eaff7914f6818d312e58fdb4e3b7dbd4c9338f2d42b92833dca97aeba054fee1413677808858a8e0901fcbd3a9426e6a8da8928f006a96ddb2fecbd83017edd5d3af49ee17db9122c06c68c5e282b543c441f7f596f6b9ac51423eb44823d00e41ebe97a17c38fc73959c241d7903c2727a9d1ff58204931f3f9921af83e87563a1052b602f7c5f6d832e52baa920372028d03424e3c1e915bc3fa8ee21000db8f857e7c1b08af2d6b7267b34a545236f46689eadb141389b917d1a13d1ba4eb67c60130b01d82c9449c5a9ef8b67ace75e34fb44526d9805fa9f337511217ed5c6dd2dafb35df3dff773bbc62a3de293cd46b00442dec8ef3189302c6ccfecfc3fae45cb93492e56cd690a178da1eacbe2ab2d9f556c6fda7b05e452e2e5d858e388ca3326c367debcf50b45f5f22f0beebf5080fa21238f1f75b78995e7b9949b645fad03fe9402c1318f2719c0c40548d03ae4dcf513e5a7314c9ef4d32ca20a38d2db4dc1b3f009102c117f0c69b3f3e867245a01297a7d0bf8f3dc988d2e2ebcfe5fd9b0a0d6c5c5b668782584eeb3f8389f54e227219db70ad516a3ff0d958bce6e8adc8ea2924a06684d6f25fb8e69ff81698941692844e28b8783bb3476c34a33c18fa485377c41808b1268bced5751c7fee17942a7253b6094a16151946f0bb62a6264d6098b81105a22661713c785ffe42d28a7d301149cd47381358c9097318f98ba8828391b65f62ac4a2b0842c3e50c089f95d7274e1f1eea448ff54e3aa02bff35595b85b6f139c5930e10f09bfb7e2bbb849d4e5397392fa27721b568599453b184d7c4b2bc6d780949984b46e6b143cb49cd6bafc4161ef73fcda20a2fcaf07f875827f881cb120bfdafd0dfe6dd0ff7e88b7cb32606d207d1a6cf0edaee90a2a773a468c19c24067b757ad0509478cd0c28348b8e75683bee351dab558670e2de72a1533006adf432d14e53dda25a2a2c57d8f88a64d5443ba260a7bb965fcd7064d625b8e49f636d296b9cd3854aee31f592cc46901750ac119b880445e4efd70f9e0e580cbc18921c993ef7814782015b27aa21167db5e6efa893589d604dfcd4f35bae1f8e2c79d2a3d4973c8334c06424dec2045e04103c48f2e167d54d2be0661ff499dd6027dfa9936189bc5eef4c92e6d919171200e0fbebd1cabc2b32c049b10775526c86d2320996362346da27da8b8fab2d4c042de5048b79a6a091da6ed489d2c2dd11e2a79750e6c8982fe59d4616df50a0348a53133c1d5afbb7494fdc12590790e3d6aedeb0ed1782aa02ec4dc73d257dccc1605b1039d494d0152aa6279ab5ccc8e1d36b6aa6c4db65f33c80a072c0ce97c00f032ff8d15abb3f28f0e951001482b214a657de3e079e2fe413ef31c7724f3d1f6937ed92a74a8d6c2a5eaedf02802f9b80c636c7fecb47bcef6887fd85615f0371ecb06b60a6b1c1bc71136636ac86d7cf2bfcb402d23afdbbc3d9d2d598be75efed8174e6bc848c3d9fe8902ce98548c8e0f90bffcf7fa66f5a0aaef6b7189b1c4997c72cf7975da8990f7a984e8930ea2eb445295b441a16f83f88ab3580555af321eeb5da6bde39fe3bf5584446f1da1084193c87c9287df3642742c2602d47c3502c11f3b59c9e7fec725eb125165e8157d8df89059cd70531fb7eb2a94f087304ae9c6a7ec5a8ab3f467f060808570c54051e524bc4fecc4681f58a7afc03266b265c338debbe5bb27ece7e689fe5e03fe0c9d627e24f07bb68d1bb51c0ff94e870d57b4298b5a0034842e7ca0d6ffda0aa9edf7f18ea9fb6eacd37addae117472996716caaecf6167c3066bfa2e12436ea97c87faa4c115667a1d90d2e93558bba2467b850b690533d3ffef45b4975386fa6ec5f50c2cda7493c3e851d5d0ed5d8d30f5d8dfe7c162341034057829d8119d8781f417ebf06b56177f71c99879ef231fe5e9fb836866c028dd964ec878656af1a0f4aa04e5c4005948d49d341e5d1352cfdd91d17d0d44f127bf38ec18fbf0b6e86ac75b796fe733fbd10f8193d730b9fd2b6a44c57ae8240f4a2d54e965b78c434fa4553d88b4aacfb1c93c0b304a6f8b1204ed18f13a3d832024cf9ff035631d0c4029dbc62b348d17bdbf33b2b980315f3f4a80f5c5ca86a2081ecac7b2ad867805ff2d581150458151d99c2358aa40a2530855583a3bf1b094597ec228f89bdfd4b6fb6e513f065b2d2d9f58195c6e16083ad216aea53fdb38661838358544bcc4ff867d58c7d0e5d833707dfaa344879af719cb9c96bda15d383c6d4942abc4cf67669ab84a016c2344308f1b08a39cbc292254d61e84fb638963ba1d47cfc0a5382095bf4c0f3c9526dfc6d1333963cda98de79299add563acc4de590b4c35d3327b6c78b67bd884d1698aca6a2cc2f3575222f4cfc70973fac6e66de4fa9e9bee3d502d412964fa5f73d4c35e4927ef8814920df919ec52d17e9ef8c60113f13b2f8c1d613f579d5ad1610f71bde6f43ef000b13d86f200d33dc0ab49d9ffd0936937e0ef5f77293968b48d5999e003b9f4954872d1caf2171aee097c678f8e187074b1e1eab1e3fa0ce38560d757c490dee85637c904b9302cacf67cdb930784f1603263c24fd486ee2690eaaed017c5340aacd467a6e5b33d196bf194d3319665c69f16736cb2d2abd6d55f0c5a9331cf29a023442f7e66b2d90ba202485ed1909c7167f16e30bc44060098cddb29ab6cf494ae92c4d3e8acda359629468fa81d20aa7aea83a65009520e4fe32b1c9495b07dacbbf3025ce306124c5e44aee4c3a839734191a2edeaea0552cef6210354fe780bd8772c72c5dec66352f42bd44c15eb55cdb720702e91f1c7a393e56e48747e44207844b656c117f7db84416daed833ac0e967494aa6d7aa9754444960e525cf03a8ccb129e1f41d1a93e364041a84017239a07fd47645d958e6b7ca609abb234020f8182ea4147a26d18809f56091de34f86c4ede3e62c28db1bdd8779b72bb906ca6d9f4da0d41663b4cf441d455bf156b98081d696c4ab94e8db86eea00190c607c63194d4cf703ee1108f9f2069a67f725c1ebfcc3579b90b8330e83e42b14229d449f57a8b455491dab028c4bb64946af74366a77d7a1dc33da973b9b6681c48bce3be5395b913b293832e4dfa7e19df3832ecfe0eb5e81a6dd03999c7be6ea51a06a70732d512732e4298134a88476d9d0c399611ffc71f9db8bbdfaf992b3063e54f889c3dfd77c660dac02af91da54aad40202b44bacfdc9490a2a8fbb682903a7a18527547103281e63c94855434eb3ee7627d8af898c74bd24ea15a04766c859b402a5ea97fa6ab33260cf18ca06952e4f9b20489625671a00847a4d54f5901ae8f300627abae47bf5aa78a302f03d554dbf96ef7666dc3da65b72cbc48d19a70e0132c3a22004cfb9f82eb42aa01d2151a34a6c70372ee78f65732ab39a289cab648100cc08f74901ba2050017afc37085653a156b560fbad499230b791d355dd199124e4f5aa36f12d02ad4ce1b67b993b3a213a6e362adce713fad9746eb0bf7a110fe47ecfe6daa00b82c9f615f0ca8a0ffb03c1f9b372cc2dc4c1b554ae66e2d3b4657c8bad9665a9a1cd1816d385dd77f691a0b5b11576de6ed1f012db3526c8a8868b49f3dca16e98c59707b25806b206b691386805f476cfd81a7b11cadc6d07f236c1361bea46f1125e79b168d07cef18eeeef20b26b2d69d056bf14fbf18e89cad0054ad4b5563a49e3046f2838a54a6c42bd991b4be116fc42a2f595aca2ad2da7af6c1a7ddbc7c34518ffcd75a297b7c90af7add485fac32cec135cbca2be48a3c9f795d9a7b96f26866ff6de232cea48092cbbd5a8cf6db7fd63449bc8eee5b0745515c6efdd8cfbf4cc227d2dfb2ad6484370a397319a00b03b8804f283243583821675f1b10ab605b741705b1b8178d53db05c43e101e956d998edf5918bec4860f2915647445ebbf164e94afe84013c7490ce76e3d8b43f"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x8, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1a0c0, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r3) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$inet6(0xa, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x0, 0x80001) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$VT_RESIZE(r4, 0x5609, &(0x7f00000000c0)={0x9, 0x20}) 02:00:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x6c000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:07 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000006bbff02000000000000000000000000000100000e22"], 0x0) 02:00:07 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000007bbff02000000000000000000000000000100000e22"], 0x0) 02:00:07 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000008bbff02000000000000000000000000000100000e22"], 0x0) 02:00:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x74000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:07 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000011bbff02000000000000000000000000000100000e22"], 0x0) 02:00:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001600)='/dev/zero\x00', 0x400, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r3}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000001640)={r3, 0x4}, &(0x7f0000001680)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000016c0)={r4, 0x800, 0x2, 0x3}, 0x10) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@xino_auto='xino=auto'}, {@metacopy_on='metacopy=on'}, {@xino_auto='xino=auto'}, {@index_on='index=on'}, {@xino_auto='xino=auto'}, {@xino_on='xino=on'}], [{@dont_appraise='dont_appraise'}, {@dont_measure='dont_measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user$eth0bdev:posix_acl_access!'}}, {@appraise='appraise'}]}) 02:00:07 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000020bbff02000000000000000000000000000100000e22"], 0x0) 02:00:08 executing program 0: mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x5e) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x7a000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:08 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000030bbff02000000000000000000000000000100000e22"], 0x0) 02:00:08 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000040bbff02000000000000000000000000000100000e22"], 0x0) 02:00:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x7d000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:08 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vcsa(&(0x7f00000011c0)='/dev/vcsa#\x00', 0x6, 0x20100) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f0000001200)={0x56}) r3 = dup3(r1, r0, 0x0) dup(r3) sendmsg$OSF_MSG_ADD(r3, &(0x7f0000001180)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001140)={&(0x7f0000000300)={0xe0c, 0x0, 0x5, 0x301, 0x0, 0x0, {0xc, 0x0, 0x7}, [{{0x254, 0x1, {{0x0, 0x8000}, 0x40, 0x1, 0xfffa, 0x7ff, 0x1f, 'syz0\x00', "49d9119fd34897f94bd8cff9e0a7bb1ed3120b41323bf342d348c7c5e1299338", "ef25bd5649800f7d75ccc3dff7e8bd49e39b85d156dd6f3172170fca80199ca0", [{0x0, 0xfff, {0x3, 0x6}}, {0x3ff, 0x1f, {0x1, 0xfe}}, {0x200, 0x0, {0x3, 0xfffffffc}}, {0x3, 0xde, {0x3, 0x4257}}, {0x2, 0x8, {0x2, 0x100}}, {0x101, 0x7f, {0x2, 0x800}}, {0x1, 0x100, {0x1, 0x8}}, {0x7, 0x7, {0x2}}, {0x800, 0x8, {0x0, 0x1}}, {0x7e, 0x2, {0x1, 0x37}}, {0x2, 0xb5fe, {0x2, 0x4}}, {0x9, 0x8000, {0x0, 0x6}}, {0x81, 0xfffa, {0x2, 0x80000001}}, {0xdf78, 0x1ff, {0x0, 0x4145}}, {0x8, 0x6, {0x3, 0xc6}}, {0x3f, 0x7fc5, {0x0, 0x6}}, {0x1, 0x8, {0x0, 0x7}}, {0x4, 0x4, {0x2}}, {0x8, 0x1f, {0x1}}, {0x4, 0x9, {0x2, 0x7}}, {0xf2, 0x8, {0x0, 0x1}}, {0x3, 0x7fff, {0x0, 0x1}}, {0x4a, 0x366, {0x0, 0x74}}, {0xffff, 0x9, {0x3, 0x5eec}}, {0x2, 0x0, {0x1, 0x5}}, {0x0, 0x6, {0x3, 0x4}}, {0x8, 0x1, {0x0, 0xf2}}, {0x9, 0x3, {0x2, 0x4}}, {0x8, 0x988, {0x1, 0x1}}, {0x831, 0x9, {0x3, 0xed}}, {0x7, 0x98, {0x0, 0x9}}, {0x2, 0x930, {0x0, 0x7}}, {0xf86b, 0x59, {0x0, 0x7fff}}, {0xff59, 0x1, {0x2, 0x8}}, {0x1, 0xfff, {0x2, 0x2}}, {0x5149, 0x7, {0x0, 0x3}}, {0x7895, 0x1904, {0x2}}, {0x0, 0x810, {0x0, 0x1}}, {0x796, 0x6, {0x0, 0x2}}, {0x0, 0x2, {0x2, 0x455}}]}}}, {{0x254, 0x1, {{0x0, 0x1}, 0x7f, 0x3f, 0x4b, 0xffff, 0x1f, 'syz1\x00', "8b5541f10ef083ff1a742d1f385373fa9f536ff36d9d846fee32b8cc4bfea74f", "d7132f1856becba7a2a1aa62ee46c8f2a88585bae0faf78e2bbdd9090c4278e7", [{0x8001, 0x1, {0x3, 0x400}}, {0xfff, 0xa06, {0x3, 0x8c}}, {0x8, 0x9, {0x3, 0x100}}, {0x7703, 0x80, {0x1, 0xf4d}}, {0x38, 0x3ff, {0x1, 0x8}}, {0x1f, 0x2, {0x2, 0xd6}}, {0x8000, 0x7, {0x2}}, {0x3, 0xfff9, {0x0, 0x6}}, {0x7, 0x0, {0x0, 0x7}}, {0x6, 0x20, {0x0, 0x3}}, {0x3ade, 0x3f, {0x3, 0xcd9}}, {0x1, 0x0, {0x3, 0x200}}, {0x3, 0x6, {0x3, 0x7}}, {0x6, 0x80, {0x2, 0x1000}}, {0x9, 0x3f, {0x0, 0x8fe6}}, {0x2ee0, 0xfff, {0x2, 0x2}}, {0x8, 0x4, {0x1, 0x101}}, {0x1, 0xd949, {0x2, 0x2}}, {0x0, 0xfffd, {0x1, 0x101}}, {0x80, 0xfff, {0x3, 0x1}}, {0x1, 0x6, {0x0, 0x2}}, {0x6, 0x8, {0x2, 0x5}}, {0xa44, 0xfff7, {0x0, 0x1}}, {0xfff9, 0x5, {0x1, 0x1000}}, {0xffff, 0x6, {0x0, 0x20}}, {0x49, 0x7, {0x3, 0x1}}, {0x9, 0xc99, {0x0, 0x3ff}}, {0x400, 0x0, {0x3, 0x4}}, {0x0, 0xaf3d, {0x2, 0x100}}, {0x7fff, 0x1000, {0x2, 0x5}}, {0x0, 0x64, {0x2, 0x9}}, {0x1843, 0x1ff, {0x0, 0x2}}, {0x3, 0x0, {0x0, 0x8}}, {0x8000, 0x9, {0x2, 0x400}}, {0xffff, 0x1f, {0x2, 0x400000}}, {0x1, 0x51f8, {0x2, 0x5}}, {0x2, 0x8ac, {0x3, 0x10001}}, {0x3, 0x5, {0x3, 0xdb85}}, {0x80, 0x20cd, {0x3, 0x8}}, {0x4, 0x0, {0x1, 0x1}}]}}}, {{0x254, 0x1, {{0x1, 0x4}, 0x9f, 0x1, 0x9, 0x2217, 0x11, 'syz1\x00', "78d337ce72d7fc1fe3ad2bb62a60227252000d497e776baa874115b087d8b300", "7d1dc8a1a4b9b94ce0eddc45d6bce8bff725b8ab0b3c242735a61c61f1595cb2", [{0x6, 0xb6, {0x0, 0x9}}, {0x15e8, 0x3, {0x0, 0x8001}}, {0x7b26, 0x8, {0x3}}, {0x4, 0x5, {0x0, 0x3}}, {0x1000, 0x8000, {0x2, 0x8}}, {0x401, 0xfde, {0x3, 0x9}}, {0x0, 0x3f, {0x1, 0x1}}, {0x3, 0xfff7, {0x1, 0x80000000}}, {0x6, 0x1f, {0x1, 0x8}}, {0x3, 0x5, {0x0, 0x7}}, {0x9, 0x7f, {0x0, 0x5}}, {0x6, 0x1, {0x1, 0x7eb}}, {0x2, 0x1, {0x1, 0xc009}}, {0x6, 0x3, {0x0, 0x6}}, {0x3, 0x3, {0x2, 0xff}}, {0x101, 0x3, {0x3}}, {0xf50e, 0x7fff, {0x3, 0x11e3}}, {0xd8e, 0x9, {0x1, 0x3}}, {0x0, 0x3, {0x1, 0xffffffff}}, {0x49, 0x1f, {0x2, 0x4}}, {0x5, 0x0, {0x3, 0xffff7fff}}, {0x9, 0x29, {0x1, 0x1}}, {0x1, 0x4, {0x1, 0x5}}, {0x5, 0xfff, {0x2, 0x2}}, {0x1ff, 0xfff, {0x1, 0x3}}, {0x136, 0x8, {0x1, 0x3f}}, {0x8000, 0xfff8, {0x2}}, {0x9, 0x1f, {0x1, 0x3}}, {0x4, 0x2, {0x1}}, {0x401, 0x140, {0x1, 0x7}}, {0x80, 0x0, {0x1, 0x1}}, {0x0, 0x5, {0x2, 0x3bfb0e6a}}, {0x9, 0xe2d3, {0x2, 0x20}}, {0x5, 0x600, {0x2, 0x8}}, {0x1ff, 0x2c9, {0x3, 0x8}}, {0xffff, 0x5, {0x3, 0x10000}}, {0x7, 0x3, {0x0, 0x6}}, {0x227, 0x7, {0x0, 0x2}}, {0x3, 0x7fff, {0x2}}, {0x2, 0x7, {0x2}}]}}}, {{0x254, 0x1, {{0x0, 0x3ff}, 0x4, 0x5, 0xfe, 0x1, 0x22, 'syz0\x00', "4fc3b92e65409213dcc468ac7790e0e9fda52a677d01b608092bf2af7d6241be", "06718b5c6895c1ff82ca08a7479273e773e91728238c6f6b9d31eaf1bcff554d", [{0x9, 0x9, {0x3, 0xffffffff}}, {0x8001, 0x7, {0x2, 0x56bf}}, {0x2, 0x7fff, {0x0, 0x1}}, {0x45fc, 0x8, {0x3, 0x8}}, {0x0, 0x5, {0x0, 0x8}}, {0x200, 0x1, {0x2, 0x80000001}}, {0x441d, 0x2, {0x2, 0x3}}, {0x2, 0x3, {0x3, 0x5}}, {0x3, 0x412, {0x3, 0x4}}, {0x3f, 0xff, {0x0, 0x5}}, {0x4, 0x401, {0x1, 0x3}}, {0x7, 0x3, {0x2, 0x20}}, {0x3, 0x4, {0x1, 0x4}}, {0x7ff, 0xff, {0x3, 0x25c}}, {0x80, 0xc5ff, {0x0, 0x8102}}, {0x3, 0x277, {0x3, 0x2b}}, {0x2, 0xe4, {0x2}}, {0x3, 0x101, {0x0, 0x8}}, {0x7, 0x401, {0x2, 0x2}}, {0x44b4, 0x6, {0x1, 0x1}}, {0x20, 0xc9c, {0x3, 0x5}}, {0x0, 0x21, {0x3, 0x3}}, {0x9, 0x10c0, {0x3, 0x7}}, {0x0, 0x1, {0x0, 0xc1}}, {0x800, 0x100, {0x0, 0x9}}, {0x5, 0xba, {0x0, 0xf05}}, {0x1, 0xc0, {0x2, 0x4}}, {0x14b, 0x9, {0x3, 0x3c36}}, {0x56d7, 0x7, {0x3}}, {0xa77, 0xc29, {0x3, 0x80}}, {0x7, 0x0, {0x1, 0xab40}}, {0x9, 0x9, {0x3a147451569f3cec, 0x4}}, {0x1, 0x2, {0x0, 0x3b}}, {0xffff, 0x27, {0x0, 0x73ef}}, {0x1, 0x1f, {0x0, 0x9}}, {0x8, 0x4, {0x0, 0xffffffa0}}, {0x4, 0x8, {0x0, 0x9}}, {0x0, 0x8001, {0x2, 0x401}}, {0x5, 0x0, {0x2, 0xffff}}, {0x800, 0x4, {0x2, 0xffffff7f}}]}}}, {{0x254, 0x1, {{0x0, 0x2}, 0x3, 0x1, 0x8, 0x4, 0x23, 'syz0\x00', "ea22579abeb0973c1e2dc1f710a0fa221cf236eba3e443d02895af4aca9de4de", "35811ad5563b3f2bc76d57823456b68bd0786f39bd6e4d60fbc5c4c8c889c8ae", [{0x5c, 0x20, {0x2, 0x80000000}}, {0x1, 0x3, {0x0, 0x10000}}, {0x3, 0x2, {0x0, 0x2}}, {0x20, 0x0, {0x2, 0x4}}, {0x4, 0x28, {0x0, 0x7fff}}, {0xa703, 0x1, {0x1, 0x1}}, {0x4, 0xd2cc, {0x3}}, {0x0, 0x6, {0x1, 0x5}}, {0x3, 0x8, {0x0, 0x2}}, {0x0, 0xfffa, {0x3, 0x1}}, {0x7, 0x4, {0x2}}, {0x7, 0x3, {0x2, 0x7}}, {0x2, 0x55a8, {0x1, 0x6}}, {0x0, 0xf801, {0x3, 0xe5}}, {0x6, 0x9, {0x0, 0x4}}, {0x401, 0x5, {0x1, 0x2}}, {0x80, 0x1, {0x0, 0x4}}, {0xfffc, 0xf477, {0x2, 0x100}}, {0x63d, 0x3, {0x2, 0x6954}}, {0x5, 0x8001, {0x3, 0x6}}, {0x0, 0x7, {0x2, 0x9}}, {0x0, 0xfb5, {0x2, 0x7}}, {0x5, 0x800, {0x1, 0x8001}}, {0x7ff, 0xfff, {0x17c098930c74238b, 0x7fff}}, {0xffff, 0x6, {0x0, 0x3}}, {0x800, 0x1, {0x2, 0xa05}}, {0x8, 0x3f, {0x3, 0xffff}}, {0x5, 0x57}, {0x6, 0x4, {0x1, 0x4}}, {0x5, 0x8, {0x2, 0x200}}, {0x20, 0x0, {0x1, 0x2}}, {0x6, 0x0, {0x2, 0x8}}, {0x9, 0x7, {0x3, 0xc56d}}, {0x1, 0x1, {0x1, 0x5}}, {0x2, 0x8, {0x1, 0x35fd}}, {0xba, 0x80, {0x3, 0x3}}, {0x9, 0x7, {0x3, 0x8000}}, {0x0, 0x0, {0x0, 0x4}}, {0x9, 0x0, {0x2, 0x5}}, {0x0, 0x1, {0x3}}]}}}, {{0x254, 0x1, {{0x3, 0x4b}, 0x20, 0x9, 0x2, 0x2, 0xd, 'syz0\x00', "3803b73b07f7797a9fea61f1b244241ed234210a5e55b5857db8128295787b0b", "cd59361894d8b58b8e61a6538ced8db81b9195fbc7e1ba577cb32dfda4bf1bb1", [{0xe96, 0xae8, {0x1, 0x4}}, {0x20, 0x81, {0x1, 0x3}}, {0x5127, 0xcfa, {0x3, 0x5}}, {0x1ff, 0x9}, {0x706, 0x3, {0x0, 0x3}}, {0x81, 0x2, {0x3, 0x3}}, {0x6, 0x4, {0x3, 0xd7a}}, {0x20, 0x80, {0x2}}, {0x65e7, 0x0, {0x0, 0x8}}, {0x5d9, 0x9, {0x2, 0xff}}, {0x9, 0x0, {0x0, 0x800}}, {0x7, 0x5, {0x1, 0x6}}, {0x40, 0x0, {0x0, 0x1}}, {0x39, 0x7716, {0x0, 0x2000000}}, {0x0, 0x3, {0x2, 0x5}}, {0x3ff, 0x6, {0x2, 0x7}}, {0x6, 0x3, {0x0, 0x4}}, {0xd054, 0x5, {0x1, 0x2}}, {0x9, 0x5}, {0x27, 0x3ff, {0x0, 0x6}}, {0x9, 0x7ff, {0x0, 0x7ff}}, {0x10, 0x40, {0x3, 0x7}}, {0xfff7, 0x6, {0x3, 0x1e7}}, {0x3ff, 0x0, {0x0, 0x4}}, {0xfffd, 0xf71, {0x3, 0x9}}, {0x1, 0x6, {0x1, 0x7f}}, {0x8001, 0x5, {0x0, 0x2}}, {0xd48, 0xf982, {0x1, 0x5}}, {0x10, 0x7fa, {0x1, 0x2}}, {0x8, 0x2, {0x2, 0x101}}, {0x4, 0x8, {0x1, 0x4}}, {0x101, 0x2, {0x2, 0xfffffffd}}, {0x560, 0xbb9, {0x2, 0xf8c}}, {0x0, 0x0, {0x1, 0xfffffffe}}, {0xba, 0xd261, {0x3, 0x8}}, {0x97a, 0x96b, {0x3, 0x101}}, {0x6cb, 0xfff9, {0x2, 0xff}}, {0x0, 0x3f, {0x2, 0x6}}, {0x2, 0x8, {0x1}}, {0x1000, 0x1000, {0x2, 0x40}}]}}}]}, 0xe0c}, 0x1, 0x0, 0x0, 0x40}, 0x20040000) eventfd(0xb74) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r4) syz_mount_image$tmpfs(&(0x7f0000001240)='tmpfs\x00', &(0x7f0000001280)='./file0\x00', 0x9, 0x3, &(0x7f0000001480)=[{&(0x7f00000012c0)="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", 0xfc, 0xf2}, {&(0x7f00000013c0)="ed58fa42b1a8f8a50abb9e3c43581657a5ed564c853b57b0794bf175b453673ac1b9b9ab932479d58a4bd3e03823bc16ee71aa444e86756d83ef5089a80a45962d5ac69508021390c1bc85596f4e64a496e29ab68ee5e62130d2719abf5759dd48482ce434cea1064ac0ad3ca258f8e94febcb", 0x73, 0xffffffffffffffc0}, {&(0x7f0000001440)="52bf22d7ee6b781c351ba68c9ae8288e6ffed0f6ded3425264c93c10a889464d6193b848f1749adc772a6f06e72e4e03a0f0732cbff5", 0x36, 0xd}], 0x1000008, &(0x7f0000001500)={[{@huge_never={'huge=never', 0x3d, 'eth1]self'}}, {@huge_never={'huge=never', 0x3d, '/dev/vcsa#\x00'}}, {@nr_inodes={'nr_inodes', 0x3d, [0x39, 0x35, 0x31, 0x31, 0x78, 0x6d, 0x6b, 0x34, 0x31]}}, {@uid={'uid', 0x3d, r4}}, {@huge_always={'huge=always', 0x3d, '/dev/vcsa#\x00'}}, {@huge_never={'huge=never', 0x3d, '\\:trustedwlan0(%{vboxnet1eth0wlan1'}}, {@nr_inodes={'nr_inodes', 0x3d, [0x64, 0x31, 0x37, 0x37, 0x34]}}], [{@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'syz1\x00'}}, {@dont_hash='dont_hash'}]}) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x8b9}, &(0x7f0000000040)=0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r8, 0xc0106426, &(0x7f00000001c0)={0x5, &(0x7f0000000080)=[{0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000280)={r9, &(0x7f0000000200)=""/103}) 02:00:08 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000060bbff02000000000000000000000000000100000e22"], 0x0) [ 776.675956][T26619] __nla_validate_parse: 38 callbacks suppressed [ 776.675967][T26619] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:08 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800000000ffffff8dbbff02000000000000000000000000000100000e22"], 0x0) [ 776.748950][T26621] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 776.803191][T26619] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 776.835075][T26625] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:08 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800000000fffffff5bbff02000000000000000000000000000100000e22"], 0x0) 02:00:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x7fffef47}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 777.056688][T26636] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:08 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800000000000000ffbbff02000000000000000000000000000100000e22"], 0x0) [ 777.119941][T26637] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) pipe2(0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="183b3f7f70e456bc0000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r3, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1b, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="18e2661b9500000000000000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4}, 0x70) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(0xffffffffffffffff) sendmsg$RDMA_NLDEV_CMD_STAT_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x38, 0x1411, 0x20, 0x70bd28, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x3}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x3}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x2}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x24008000}, 0x4050) r11 = dup3(r10, r9, 0x0) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x71d}, [@generic={0x1, 0xc, 0xb, 0x7, 0x2}, @map_val={0x18, 0xa, 0x2, 0x0, r12, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x3, 0x6, 0x3, 0xa, 0x1, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x778f}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0xff1, &(0x7f000062b000)=""/4081, 0x41100, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4, r8}, 0x78) [ 777.191388][T26637] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:09 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000001c0)=0x54) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) dup(r7) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r9 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r8, 0x84, 0x75, &(0x7f00000001c0)={r10}, 0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000300)={r10, @in6={{0xa, 0x4e21, 0x4, @ipv4={[], [], @multicast2}, 0x8}}}, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGREP(r4, 0x80084503, &(0x7f0000000200)=""/225) 02:00:09 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8000000008dffffffbbff02000000000000000000000000000100000e22"], 0x0) 02:00:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x7fffef48}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:09 executing program 2: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) sendmmsg$inet_sctp(r3, &(0x7f0000001700)=[{&(0x7f00000000c0)=@in={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000500)="930ec4ed3b44f20a68556e0daf9c5cdbabe33073b9a8934cb89cce1be716c420c93265a7e6fe6692b5ec931e1b56c4c43a1c9ab326b354715b0fd02c16e44777b5267e57c72dd0f2f8774b3e85038a4383a1238e3d178efe06f95e5b9df8329639c2c0b20b3d07105a14851038bf121f96f183cb2b621547a4518cb0e6566b56bd988d1a1001f7028c02300ca27b21250368a3f0ff648f8ef9fda14908102ee8f8617a72bc66f364c548ad6c936d976060b2d4455e9faee2db39ab61088bba8215603154fbc4168c87aec02568ccb0577a04306db62a943a1267d2f8", 0xdc}], 0x1, 0x0, 0x0, 0x4}, {&(0x7f00000002c0)=@in={0x2, 0x4e23, @rand_addr=0x64010101}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000600)="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", 0x1000}, {&(0x7f00000003c0)="1213ddacd053fe882641a87589413e5cdb8fe1ce840d1aa794a478101b861c3e9f83b9727bb4882b278359a142e7313be4e0747855f4f544af05daeaa277d0a3400abb5bea167055e6cb28d209eca41f798266c675aad623a84d2fae6d73ef7cf74a77880e7aca55c46c674f88ee564a5fa3855a9eb043e8578d674eff1a70df757849866a", 0x85}, {&(0x7f0000001600)="2cb9075a6caa796f089e9eaa06ce30fecbee33691aa77528f7b2cf1bb7d5cc7bc3ca829b93d204959c3dbcafd443604ea246d9ca2ce15983abc1e1dea2f69c525ac07530d91d2fc9afa141d8d670f44d16db4f2025a01edc485193e79a5e5efd0bf18576b6a339b6f5a6decb20ab3414656c9025ea2b614ce436897d249f9b72185c2e1815b485e6032e418742b48d157e768862c6a8bb72e62014cee662cc4818480a43a7f541bc9c03f1ce8d28fb8cf1e855fe9fb8e99554342fdd17387f384f3e764362626b68b9088e0a7916c5a1bc124060e6fc993b08c9f5a77e250b4c9b247cbc", 0xe4}], 0x3, &(0x7f0000000340)=[@dstaddrv6={0x20, 0x84, 0x8, @private2}, @dstaddrv4={0x18, 0x84, 0x7, @local}], 0x38, 0x400d5}], 0x2, 0x8c) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b0304c100000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc71495953149b60f0771b65d33e1299bb7cd7f57649cd9a822c0c"], 0x68) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+'}, 0x16, 0x0) close(r4) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3={0x3000000, [{0x0, 0x7}]}, 0x18, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 777.396017][T26645] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:09 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='aio\x00', 0x80, &(0x7f0000000180)='vboxnet1&\xbfmnet0\x00'/31) getegid() ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x9) 02:00:09 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800000000f5ffffffbbff02000000000000000000000000000100000e22"], 0x0) [ 777.492369][T26651] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 777.579315][T26653] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:09 executing program 2: socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='htcp\x00', 0x5) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)=0x9, 0x4) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x111002) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES64=r1, @ANYRES32], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x34}, 0x1, 0x0, 0x0, 0x20040}, 0x8805) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000080)={{}, 0x10001, 0x4, 0x6fc6}) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='wg1\x00', 0x4) sendto$inet(r0, &(0x7f0000000640)="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", 0x10000, 0x80, 0x0, 0xfffffffffffffd64) [ 777.652696][T26653] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:09 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000030000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:09 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) 02:00:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x7ffff000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 777.865384][T26667] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[0x1, 0x200, 0x4, 0x87af, 0x8, 0x5, 0x101, 0x9, 0x1fc000000000000, 0x312f, 0x4, 0x20, 0x9, 0x5, 0xe0f, 0x1], 0x0, 0x100000}) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000200)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:00:09 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000050000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:09 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvfrom$rxrpc(0xffffffffffffffff, &(0x7f00000001c0)=""/4096, 0x1000, 0x10000, &(0x7f0000000040)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @rand_addr=0x64010102}}, 0x24) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 777.981377][T26673] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:09 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000060000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:09 executing program 2: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xa2, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2f6465762f62ebf0f873673000"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ubifs\x00', 0x24400, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000007c0)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) setsockopt$inet_buf(r2, 0x0, 0x2c, &(0x7f0000000140)="223c38cdea188e2ce2cf279411f3169d1159a085366df141ebe54b103419eedbdf9f9161507f98f660bdcee6d0dd4c7b68cefbcb7070866246078200be0f88eff26430d4ab96757c2888e103cb73dff2852ba4c0c6e1edb32a1d5fddb32dcc4e05d575", 0x63) 02:00:09 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x202700, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000040)) [ 778.157078][T26680] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 778.180288][T26681] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x85000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:10 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) fcntl$notify(r1, 0x402, 0x80000018) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000780)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newqdisc={0x38, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0xc, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0x200}]}}]}, 0x38}}, 0x0) 02:00:10 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000070000bbff02000000000000000000000000000100000e22"], 0x0) [ 778.396945][T26690] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:10 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000080000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:10 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffd8e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_STATION(r7, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="8400dd97564db76b5b1e6ac3fb1aff352c2a0000", @ANYRES16=r8, @ANYBLOB="020027bd700004000000120000000500c200ff0000005f00ac00cc2e0408fa3b94464939a8e6440f00f10a708fa0fa1631d90f9e82f2586ed0695cffeacf4cc61386da8cdb093f19c2e2f69ddb5912f07093cddb7db32fbc5a3b52ece4392a0f5bd14bcc6d7e7f244a5b87ff61e7f1b5bafb7d95c1000800010003000000"], 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r9 = open(&(0x7f0000000400)='./bus\x00', 0x1143442, 0x0) r10 = creat(&(0x7f0000000040)='./bus\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ftruncate(r10, 0x208200) sendfile(r0, r9, 0x0, 0x8000fffffffe) syz_open_dev$mouse(0x0, 0x0, 0x20000) 02:00:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0x9effffff}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:10 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000110000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:10 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000000)={0x0, @reserved}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f00000000c0)={0x5, 0x47504a50, 0x0, 0x4, 0x3, @discrete={0x0, 0x3}}) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, &(0x7f0000000100)={0x0, 0x0, 0x2, 0x4, {0x4, 0x4, 0xfff, 0x7}}) open(&(0x7f0000000140)='./file0\x00', 0x311682, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0xfff, 0x30000) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x4, 0x8001, 0x3}) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000280)={0x9f0000, 0x0, 0xb6, 0xffffffffffffffff, 0x0, &(0x7f0000000240)={0x9c0904, 0x8, [], @string=&(0x7f0000000200)=0x3}}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r3 = syz_open_dev$vivid(&(0x7f00000002c0)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_S_OUTPUT(r3, 0xc004562f, &(0x7f0000000300)=0x674) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000340)) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x8040, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000440)={0x3, 0x7, 0x4, 0x1000, 0x7ff, {}, {0x1, 0x8, 0x1, 0x8, 0x4, 0x5, "cc539158"}, 0x2, 0x1, @offset=0xfffffffc, 0x6, 0x0, 0xffffffffffffffff}) name_to_handle_at(r5, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x2a, 0x6, "5d3b4df72170c420e02239d1493d0b30e355db4239c97d037463d1503f6669617936"}, &(0x7f0000000540), 0x1000) r6 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x40000, 0x0) fcntl$setown(r6, 0x8, 0x0) syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0xffffffffffffffff, 0x400081) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000680)={0x100, 0xa, 0x4, 0x20000, 0x2, {0x77359400}, {0x1, 0x0, 0x0, 0x80, 0x9, 0x62, "1a18ad9e"}, 0x3, 0x4, @planes=&(0x7f0000000600)={0x1, 0x200, @userptr=0x10001, 0x3}, 0x2}) 02:00:10 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup3(r9, r8, 0x0) dup(r10) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000400)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xffe2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup3(r13, r12, 0x0) dup(r14) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r14, 0xc0305602, &(0x7f00000005c0)={0x0, 0x0, 0x1014}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x100, 0x4, &(0x7f0000000380)=[{&(0x7f00000001c0)="899d187ef601cb1b07e090e6aa0d264afb7dd199caa723d400bbcf33f647e2e737a87fdadfbbad098194e035628be896e30cc22643ef74cdb6e95217eb153d785b6a99c72b0294957e2b564e7a9e85b347b923eb78696a2b82386d325db515286adcd32255041032e380b3a0bbeced3f5dad718d823d609eaf3c218eea164faad33c91d8082c25c0aef9", 0x8a, 0xffffffffffffffff}, {&(0x7f0000000280)="2591954d2eaa1b2c370e010af4f64c8b708c7192ba4bba6c3f5e8c70ecde09cb6d347e7348b8fd1bdb4dc1314bd32940379a754f47349b0e475cbeb9999744e6e2fbd073e1ef390de86431f0ac9447a7b7fd5002e5a50efcc6dc63383e22c1e6d8c13bc14a323c5e713de32fed18fdc8fe00d9a756ecd590af0ca21baea251c812b5f5059e311d3a021f8195bea214da28220fe81cc5eb98189ad340ce3723af7194426becb4fc754129c4ca5a0eff29c759", 0xb2, 0x3ff}, {&(0x7f0000000080)="044152e74a074d5548b3d3f4f20220f619b54523c6a9cb3cd4b9f459ae35f3c72f9eef48c935dd", 0x27, 0x100000000000}, {&(0x7f0000000340)="c0b49f8ff42ab8816f75234901f60af2ae625086d9b3099aa0e5459fbb", 0x1d, 0x9}], 0x40400, &(0x7f0000000540)={[{@discard='discard'}, {@subvolid={'subvolid', 0x3d, 0x7c7}}, {@nodiscard='nodiscard'}], [{@uid_gt={'uid>', r11}}]}) clone(0x15800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x1000000, &(0x7f0000000180)='\'pwKA\xe2wlan0procvboxnet1&vmnet0\x00') 02:00:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="030000004833cefd0d964ac01d6c4a9e0b164f2f7677b211f6f3b698eb14788978f7ce03217b50c3b8482618bb20849f60e0c766e9b8ae35af6ed793435d7edfc557195800e83bd72284067fec47ce20cc14f5dbec3f655fe37228c2e77afc6460d14e4a4d8f712099f7e7da000000000000000021eb83a5c29c45b7b4730bef4b88f0d52f9cfd662b7bc8c835302d6e00d0a2ef25f8c7ba55b674600614acbcb7c08baa56ba079f2f51b466c1e17245f64404a2ae666800"/196]}) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000000), &(0x7f0000000040)=0x4) 02:00:10 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000300000bbff02000000000000000000000000000100000e22"], 0x0) [ 778.959507][T26716] cgroup: Unknown subsys name ''pwKAâwlan0procvboxnet1&vmnet0' 02:00:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xa5000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$AUDIT_TRIM(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x10, 0x3f6, 0x200, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x2000401c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U+', 0x5}, 0x16, 0x3) 02:00:10 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x14, 0x42, 0xfffffffffffffffd, 0x70bd2c}, 0x14}}, 0x24004804) 02:00:10 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000600000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:11 executing program 2: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000c80)=ANY=[@ANYBLOB="500000001000050774740000dfdbdfa65501a381", @ANYRES32=0x0, @ANYBLOB="7fff0002810d00001c0012000b0001006d616373656300e10b00020005000700010400110a000540340000000000000808000a0009d35b587e27a8b0b9cad4a128c1aa"], 0x50}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 02:00:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xf0ffffff}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000300bbff02000000000000000000000000000100000e22"], 0x0) 02:00:11 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$SNDCTL_DSP_SETTRIGGER(r2, 0x40045010, &(0x7f00000001c0)=0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') ioctl$USBDEVFS_CLAIMINTERFACE(r3, 0x8004550f, &(0x7f0000000080)=0x7ff) 02:00:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x25, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:00:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000500bbff02000000000000000000000000000100000e22"], 0x0) [ 779.577105][T26742] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 779.601028][T26745] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xf5ffffff}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r3, 0x8008ae9d, &(0x7f0000000100)=""/213) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 02:00:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000600bbff02000000000000000000000000000100000e22"], 0x0) 02:00:11 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$SNDCTL_DSP_SETTRIGGER(r2, 0x40045010, &(0x7f00000001c0)=0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') ioctl$USBDEVFS_CLAIMINTERFACE(r3, 0x8004550f, &(0x7f0000000080)=0x7ff) 02:00:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000700bbff02000000000000000000000000000100000e22"], 0x0) 02:00:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xfeffffff}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:11 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$SNDCTL_DSP_SETTRIGGER(r2, 0x40045010, &(0x7f00000001c0)=0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') ioctl$USBDEVFS_CLAIMINTERFACE(r3, 0x8004550f, &(0x7f0000000080)=0x7ff) 02:00:11 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000001100bbff02000000000000000000000000000100000e22"], 0x0) 02:00:12 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$SNDCTL_DSP_SETTRIGGER(r2, 0x40045010, &(0x7f00000001c0)=0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') ioctl$USBDEVFS_CLAIMINTERFACE(r3, 0x8004550f, &(0x7f0000000080)=0x7ff) 02:00:12 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000002000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xfffff000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x41) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r3) r4 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r5) setuid(r5) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r7) chown(&(0x7f0000000040)='./file0\x00', r1, r7) 02:00:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="b7000000010000e0bfa30000000000000703000020feffff720af0fff8ffffff71a4f0ff000000002d040400000000002d400500000000004704000001ed00000f030000000000000c440000000000007a0a00fe000000000703000000000000b5000000000000009500000000000000023bc065b78111c6dfa041b63af4a3912435f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f300020000fe275daf51efd601b6bf01c8e8b1b526375ee4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440ea2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e52989679a16da18ec0ae564162a27afea62d84f3a10746443d64364f56e24e6d2105bd901128c7e0ec82770c8204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee7dfcb59b854e9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101ab062cd54e67051d355d84ce97bb0c6b4a595e487efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599ddd71063be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d96c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566d674e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b3045024a982f3c48153baae244e7bf573eac34b781337ad5905c6bbf1137548c7f1a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93f04bf072f0861f5c0b000000000000eedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea52acb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a9037d2283c42efc54fa84323afc4c10eff462c8843187f1dd48ef0900000000000000ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fcdb4c2890cda1f96b952511e32f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927ea5301fff0a6063d427180d61542c2571f983e96735600000554f327a353511ccedde99493c31ac05a7b57f03ca91a01ba2a30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd64bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120968308c31db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c73e1661261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a000000000000000000000000000006acc19808d7cf29bc974b0ea92499a419aa095e203c1bafbb9b9a7c2bca3f0a18ee4952f2d325a56390578f12205db653a536f0100e0eda300a43a13bd1b9f3322405d1efd78e578dc6b3fb84f3738a4b6caa800000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf79a43746979f99f6a1527f004f1e37a3926937e84fb478199dc1020f4beb98b8074bf7df8b5e783637da7418fd3aa81cffff4ac55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12f92d7ae633d44086b3f03b20d546fa66a72e38207c9d20035ab63de71a30f1240de52536941242d23896ab74a3c6670fdc49c14f34fc4eadd6db8d80eba439772bf60a1db18c472dafc5569adc282928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a4443440dc65600e64a6a27400000000000000000000000000000000000000cc0400"/2341], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) dup(r5) setsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000280)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in=@dev={0xac, 0x14, 0x14, 0x31}, 0x4e23, 0x6, 0x4e21, 0x100, 0x2, 0x20, 0x80, 0xff}, {0x9, 0x9, 0x2, 0x2, 0x7, 0x1000, 0x8, 0x4}, {0x4, 0x5, 0xffffffff, 0x2}, 0x210, 0x0, 0x2, 0x1, 0x1, 0x1}, {{@in=@loopback, 0x4d4, 0x3c}, 0xa, @in=@local, 0x0, 0x2, 0x3, 0x65, 0xb62, 0x9, 0x80000001}}, 0xe8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r9, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x3f, 0x4, 0x6, 0x80000000}, 0x14) sendmsg$AUDIT_GET(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x12000012}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3e8, 0x300, 0x70bd2a, 0x25dfdbff, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x8) 02:00:12 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000003000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:12 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') prctl$PR_SVE_SET_VL(0x32, 0x20452) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000040)=""/23) [ 780.525685][T26778] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:12 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000004000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:12 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1024a9, 0x0, @perf_config_ext, 0x0, 0x7ffff, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) pipe(0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x78, &(0x7f00000000c0)=""/120}, 0x0, &(0x7f0000000500)=""/109, 0x20, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x0, 0x0) [ 780.693945][T26791] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xffffff7f}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:12 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x80000, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000080)={0xa10000, 0x4, 0x0, r4, 0x0, &(0x7f0000000040)={0x980001, 0xffffffff, [], @ptr=0xe9}}) ioctl$UI_SET_PROPBIT(r5, 0x4004556e, 0xc) r6 = shmget(0x3, 0x1000, 0x4, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_UNLOCK(r6, 0xc) 02:00:12 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000006000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:12 executing program 2: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FIONCLEX(r4, 0x5450) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000000c0)={0x2, 0x3, 0x4, 0x10, 0x2, {r0, r1/1000+60000}, {0x4, 0x1, 0x1, 0x0, 0x8, 0x0, "525d8c32"}, 0x2, 0x2, @fd=r5, 0x8000, 0x0, r6}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, r7, 0x0) sync() ioctl$TIOCMBIC(r5, 0x5417, &(0x7f0000000140)=0x7f) 02:00:12 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x5, &(0x7f0000001400)=[{&(0x7f0000001580)="cdf8fb51e1b49f1a6a", 0x9, 0x100000000}, {&(0x7f00000001c0)="22850dc146743c861a778e", 0xb, 0x7}, {&(0x7f0000000200)="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", 0x1000, 0x4a}, {&(0x7f0000001200)="e739cda0f735c01d45773787d0c71da5df121472f23bd95cf48ba581c313d596d1cd1bdd9cedf346d0cd4922e2552af229bc6df44d0e8b3bb5f507ddbacb252443f3b12f1ca3f667cbfdd698b865bd05bcdb4227dd61ff04cacb8c51445152a89c50971a7f4da7b74bfb1cd058574571fcf2da791b8130689c55c88444a0b0976e52bc91a78761714287b1c0b28450c4226a0247af87b5e9689639e5a95c9818af87d31b66e512f2d2805931ce1b5bdc872a6190d81bcb1cfde898faa6981f4e87fb423adad01108be0a6ea9990c5fab15de7dc384702bd3e8762c275de10c406031e9cf6cde39aa", 0xe8, 0x1}, {&(0x7f0000001300)="5d16ec73c3ccf9fbc88c029ea48494b0fda808e17700ef524ccf24579d5e0f6e26d349b8b000a38d7140eadb4e07a6cd236b2c7f4b4eebc25001f0f45bed864603634e38c78c9c4fec900077c0b79b149caecb0c85af61f4953d5530c13355072222ee13f60066e1891982faedda4e09dc9da4733083e2d01437aed4b3c498f7a982c1093b8c770267580472239262e4cb7abd2dcba11b17f0e4dcf1a1e5b84d62f84c76d2ea4113c65505c29cf18c366eb9af78c057ec6d448927153197d3515e5865dff6c55f55241005bc408c0237a2c433b2f7feca65a17b9117ad888d5551655cab3e6b71d6a62308f482f80b75ded80f985b8477195e847bec", 0xfc, 0x1}], 0x2080000, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') request_key(&(0x7f0000001480)='asymmetric\x00', &(0x7f00000014c0)={'syz', 0x3}, &(0x7f0000001500)='\x00', 0xfffffffffffffffd) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 02:00:12 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, &(0x7f0000000480)='9p\x00', 0x18a8001, &(0x7f00000004c0)=ANY=[@ANYRESHEX, @ANYBLOB=',nodevm', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0]) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001c00)={0x0}}, 0x0) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x0) creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r4, 0x4008ae48, &(0x7f0000000040)) rmdir(&(0x7f00000000c0)='./bus/file0\x00') 02:00:12 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe8000000000000ff00bbff02000000000000000000000000000100000e22"], 0x0) 02:00:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xffffff9e}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 781.223462][T26810] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 781.266970][T26814] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000300bbff02000000000000000000000000000100000e22"], 0x0) 02:00:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r4, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1ff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}]}]}, 0x5c}}, 0x4008028) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) dup(r7) sendmsg$rds(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/99, 0x63}], 0x1}, 0x84) 02:00:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x206, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2, 0x0, 0x0, 0x6, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) openat$ppp(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$media(0x0, 0x3ff, 0x4000) dup2(r3, r2) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40040, 0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x1, 0x0) ioctl$KVM_GET_SREGS(r4, 0x8138ae83, &(0x7f0000000200)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000040)={0x8, 'dummy0\x00', {'syzkaller1\x00'}}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 02:00:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xfffffff0}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 781.480452][T26826] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000500bbff02000000000000000000000000000100000e22"], 0x0) 02:00:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x82, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x84c02, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r2) readahead(r2, 0x8000, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005e80)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, 0x1403, 0x1, 0x70bd2d, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'bond0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'veth1_to_team\x00'}}]}, 0x88}, 0x1, 0x0, 0x0, 0x20000000}, 0x8040) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r5, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x31, 0x0, 0x32, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 02:00:13 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$P9_RCREATE(r6, &(0x7f0000000080)={0x18, 0x73, 0x1, {{0x20, 0x3, 0x7}}}, 0x18) r7 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$P9_RCREATE(r7, &(0x7f0000000000)={0x18, 0x73, 0x1, {{0x8, 0x0, 0x1}, 0x7}}, 0x18) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000040)) [ 781.689078][T26834] __nla_validate_parse: 39 callbacks suppressed [ 781.689088][T26834] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000600bbff02000000000000000000000000000100000e22"], 0x0) [ 781.836714][T26841] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000700bbff02000000000000000000000000000100000e22"], 0x0) 02:00:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xfffffff5}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:13 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000380)={0x2, "3069f3415e19fb3e6a6551e10695f5ca298e2f161d7fd08eabe42aa78bad4b4bd6df57eb8c805dcd8bbbd50a4db49c5c6e906afed1abee90e875d8fe4d1b37f3a347a242736f826c44b51f532df9ee6ed4b0aaf498b99267b8bec0f3f35eab8669809d5ca8acb3b1e64635cad5a500423d7168aba07ec0837f44da19aa6e"}, 0x86, 0x0) msgrcv(r0, &(0x7f00000014c0)=ANY=[@ANYBLOB='\x00'/140], 0x8d, 0x2, 0x1000) msgctl$IPC_RMID(r0, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000), 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/1, 0x1}, {&(0x7f00000001c0)=""/243, 0xf3}, {&(0x7f0000019580)=""/4084, 0xff4}, {&(0x7f0000000380)=""/151, 0x97}], 0x4, 0x0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0xaa, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r3 = getpid() ptrace(0x10, r3) ptrace$getsig(0x4205, r3, 0x4000000002, &(0x7f0000000000)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x1, r3}) 02:00:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000800bbff02000000000000000000000000000100000e22"], 0x0) [ 782.154016][T26849] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:14 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000080)={0x9f0000, 0x4, 0x3ff, r3, 0x0, &(0x7f0000000040)={0x9b0961, 0xb8, [], @p_u8=&(0x7f0000000000)=0x9}}) ioctl$SOUND_PCM_READ_BITS(r4, 0x80045005, &(0x7f00000002c0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r7) fchownat(r4, &(0x7f00000001c0)='./file0\x00', r5, r7, 0x800) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 782.268769][T26852] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:14 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000001100bbff02000000000000000000000000000100000e22"], 0x0) [ 782.330903][T26852] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 782.347706][T26855] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x3, @rand_addr=0x64010102}}, 0x3fb, 0x0, 0x2bf}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$unix(0x1, 0x1, 0x0) r5 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r5) pidfd_open(0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000004c0)=@int=0x2, 0x4) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000140)={0x0, 0xfffffc30, &(0x7f0000000180)={0x0}, 0xb, 0x6000000, 0x0, 0x1}, 0x800) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f00000000c0)) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYRESDEC], 0xfd27) 02:00:14 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0xd03, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xfffffffe}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:14 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000003000bbff02000000000000000000000000000100000e22"], 0x0) [ 782.599593][T26864] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 782.622696][T26871] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:14 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000006000bbff02000000000000000000000000000100000e22"], 0x0) 02:00:14 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='dax\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 782.728708][T26872] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 782.804820][T26872] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:14 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000003bbff02000000000000000000000000000100000e22"], 0x0) 02:00:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000, 0x0, 0xffffffff}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:14 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x40, 0x0) accept$nfc_llcp(r0, &(0x7f0000000400), &(0x7f0000000480)=0x60) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:14 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000005bbff02000000000000000000000000000100000e22"], 0x0) [ 783.076375][T26887] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 783.159332][T26889] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 783.179883][T26890] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:14 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="50000000100005079784d2d466c10bbc30780800", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b00010062726964676500001400028005002d000d"], 0x50}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x28, r6, 0x221, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1}}, @NL80211_ATTR_WIPHY={0x8}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r4, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="341c50d02316609b563e00ecd4112d0100", @ANYRES16=r6, @ANYBLOB="00012d8ca1a0461b2d16522fd891c1cd7bf08bbd7000fbdbdf251a000000050092000300000208009a000000000008009a001fb07e3708009a0001000000"], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x20004080) sendmsg$NL80211_CMD_START_SCHED_SCAN(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r6, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0xc9}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_SCAN_SSIDS={0xc, 0x2d, 0x0, 0x1, [{0x5, 0x0, [0x1b]}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x40000) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 783.209435][T26895] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:15 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000006bbff02000000000000000000000000000100000e22"], 0x0) 02:00:15 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYRESDEC, @ANYRES32, @ANYRES32], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='ocfs2\x00', 0x0, &(0x7f0000000180)='\'ppp0{wla\x06\x00\x00\x00ocvboxnet1&vmnet0\x00') 02:00:15 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f80)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x48010) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "ec"}], 0x18}, 0xf401}], 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_bridge\x00', {0x2, 0x4e20, @local}}) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r1, 0x8983, &(0x7f0000000040)) 02:00:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x2) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:15 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000007bbff02000000000000000000000000000100000e22"], 0x0) 02:00:15 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x80) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000040)='syz\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000001c0)='9p\x00', 0x2000000, &(0x7f00000002c0)={'trans=xen,', {[{@dfltgid={'dfltgid', 0x3d, r0}}, {@version_u='version=9p2000.u'}, {@nodevmap='nodevmap'}, {@cache_fscache='cache=fscache'}, {@cachetag={'cachetag', 0x3d, '\\self\xff-\x15,'}}, {@cache_fscache='cache=fscache'}, {@cache_loose='cache=loose'}], [{@obj_type={'obj_type', 0x3d, 'trusted^securityppp1'}}]}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000380)={0x1, 0x2, 0x0, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) keyctl$join(0x1, &(0x7f00000003c0)={'syz', 0x0}) 02:00:15 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000011bbff02000000000000000000000000000100000e22"], 0x0) 02:00:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x3) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 783.661725][T26916] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 783.680998][T26919] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:15 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000020bbff02000000000000000000000000000100000e22"], 0x0) 02:00:15 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x200, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000200), 0x10) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x100, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000240)={0x41, 0x1, 0x3}, 0x10) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x7f, 0x8, 0x1, 0x49ec, 0x16, "b99e925ac935647d97ab6a6e8f06c6351bfebb"}) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x20, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') chdir(&(0x7f0000000080)='./file0\x00') getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f0000000280), &(0x7f00000002c0)=0x8) 02:00:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x4) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:15 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000030bbff02000000000000000000000000000100000e22"], 0x0) 02:00:15 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001b80)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="fc00"/16, 0x10) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='ext3\x00', 0x8408, &(0x7f0000000180)='\'ppp0{wl`n0procvboxnet1&vmnet0\x00') 02:00:15 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000040bbff02000000000000000000000000000100000e22"], 0x0) 02:00:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x5) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000060bbff02000000000000000000000000000100000e22"], 0x0) 02:00:16 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCRSGL2CALL(r3, 0x89e5, &(0x7f0000000000)=@bcast) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x6) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe800000000000000ffbbff02000000000000000000000000000100000e22"], 0x0) 02:00:16 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) dup(r5) ioctl$sock_inet6_udp_SIOCINQ(r5, 0x541b, &(0x7f0000000040)) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000000)=""/48) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 784.532424][T26957] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000003bbff02000000000000000000000000000100000e22"], 0x0) [ 784.705251][T26966] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000005bbff02000000000000000000000000000100000e22"], 0x0) 02:00:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x7) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000006bbff02000000000000000000000000000100000e22"], 0x0) 02:00:16 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000000)={{0x0, 0x0, @descriptor="4502a604186d93a4"}}) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xc00, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYRES64=r0, @ANYRES32, @ANYRESOCT=r0, @ANYBLOB="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", @ANYRES16=r1, @ANYRESOCT=r0, @ANYRESOCT=r3, @ANYBLOB="1ea5e42a8d14c15f16f77e69cdf469ee4ab90c5622d391f575c3ed65c83a29e2961f83d1987bd34d5a7509dad017337fb3665940740ca294a3fe4124d03a537a5ff79c2ca04a47df592eaa60041a73467f16adda2c0e62e4849e654e569f161e1aaf425f4f90d3186607cce776ef5f5edaec7f037272cb6d3e0d569f9ddc36387de510ef0d92bf7079bf6021f3e3ae03b7a2e03eeb5349a0d4ac3384253617ef24ebcc8ae00a97423673717601ef22f10322e5c2", @ANYRES64, @ANYRESOCT=r0], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1\x00vmnet0\x00') 02:00:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000007bbff02000000000000000000000000000100000e22"], 0x0) 02:00:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x8) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 785.134391][T26983] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1' 02:00:17 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) rmdir(&(0x7f0000000000)='./file0\x00') clone(0x91055683, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000008bbff02000000000000000000000000000100000e22"], 0x0) 02:00:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000011bbff02000000000000000000000000000100000e22"], 0x0) 02:00:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x9) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000030bbff02000000000000000000000000000100000e22"], 0x0) 02:00:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0xa) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000060bbff02000000000000000000000000000100000e22"], 0x0) 02:00:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff05000000000000000000000000000100000e22"], 0x0) 02:00:17 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x200000, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000040)={0x8, 0x101, @value=0x4000000000000}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x30005103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r3) socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0xfffffffffffffea9) setuid(r4) r5 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r6) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r8) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f00000002c0)='system.posix_acl_default\x00', &(0x7f0000000200)={{}, {0x1, 0x6}, [{0x2, 0x0, r1}, {0x2, 0x6, r3}, {0x2, 0x5, r4}, {0x2, 0x2, r6}], {0x4, 0x2}, [{0x8, 0x1, r8}], {}, {0x20, 0x1}}, 0x4c, 0x0) 02:00:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0xb) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 786.020804][T27017] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff06000000000000000000000000000100000e22"], 0x0) 02:00:17 executing program 0: ioctl$VIDIOC_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f0000000500)={0x0, @bt={0x80000000, 0x4, 0x0, 0x1, 0x7fffffff, 0x3e62fc62, 0x200, 0xa83, 0x7fffffff, 0x1, 0x8000, 0x5, 0x1b7, 0x3f, 0x1a, 0xc, {0x8, 0xffffffff}, 0xe5, 0x4}}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x1104903, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) dup(r6) socket$pppoe(0x18, 0x1, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000240)=0x0) wait4(r7, &(0x7f0000000280), 0x8, &(0x7f0000000440)) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r6, &(0x7f0000000200)='./file0\x00', 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup3(r9, r8, 0x0) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendmsg$AUDIT_USER_TTY(r11, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000040)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xf8}, 0x1, 0x0, 0x0, 0x20000000}, 0x11) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:18 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff08000000000000000000000000000100000e22"], 0x0) 02:00:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 786.302617][T27031] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 786.359026][T27034] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:18 executing program 2: setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000001c0), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000003c0)=0x20) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000001c0)={r7}, 0x8) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r9 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r8, 0x84, 0x75, &(0x7f00000001c0)={r10}, 0x8) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000ac0)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="082f8702dc0a073d2880719c65308c9c5a382e5112209832ea169d55b28c37d5f0f376cd7779240e6b0ce73b482d2d1975a465d16ea6416d10e62faa403a2fd022e65c59920be3f17715831603887fefd9da86d75096373904b3c66585", 0x5d}, {&(0x7f0000000240)="92024d7f7e3bfe4d75a37e5d57165a842492dfcf9980d72cb96a14e062fc0d0099c3e24d9cfd7e7f3124c5f30f8d9a5330b14ea61923e053feeee976f5e57e918a7f98e004ea6e04b8c276dc278e052b9a9a24", 0x53}, {&(0x7f00000002c0)="b0ff648f3b64abe09e135d13505327ffb054ad9cbe0e0a1e408a2f5419f87dafa09f331faaa9b009f4588321cfae6976341bdc81ab9b33f8236814866d5d0831c9618a903b31b81bdb98a04bb18fe5fc7451352283639a7bf388a86bdd275925b7e69026f460f2a22661cd260e84a79e1a7bc21434dfc65e986fa32cb220242295458c235d832f21f6f57a64edc0c0d25abd93d8181a2b80983cbb8015207ede79", 0xa1}], 0x3, &(0x7f0000000400)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @sndinfo={0x20, 0x84, 0x2, {0x8, 0x2, 0xfff, 0x3}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x9}}, @dstaddrv6={0x20, 0x84, 0x8, @empty}, @sndinfo={0x20, 0x84, 0x2, {0x75a, 0x0, 0x26, 0x2}}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x1f, 0x1860a, 0x9, 0xfffffff9, 0x5, 0x4, 0x6, r4}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x9}}], 0xe0, 0x8000}, {&(0x7f0000000500)=@in={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000540)="b3fdf22d796ac103a3674f1190a63c00db611d05af5d2b59ae543b9cead00adb20c2b5c89caba58954afbd07b36f4e5e5ab4fd7344146bfb9ef4a6ad821a8ad0ff8213e40c20a445cadab7377c5dcb77f60ad4530b1da755ba8b2d8e545e9d985faa5fbe3e2b711591e71cefcbaa6a9b79e0a8a2cae82cfdb6b7434e2478a8e829b629b745f314f2efa37e47cd0d0242450fc7c2c6d76597f814554431e3420321", 0xa1}, {&(0x7f0000000600)="8e00cdafb4af38847cb2cf76860ead42b6c6832e8cd9e357f680f5da3b3ce2d9387bccafba7b28d0f0730b841a24df59cc8f3ecd6c55358b7f396cef88c28dc1f6a3e5c2f3200e6e3952a2c54f5319897cd64899a8f1db6031f9efd75a72df9f8fae7b493008256b4fd5f5011b8f713adebeee0e4a8220a0", 0x78}], 0x2, &(0x7f00000006c0)=[@sndrcv={0x30, 0x84, 0x1, {0x8, 0x8001, 0x8, 0x3, 0x1, 0x3f, 0xb5, 0x1f, r7}}, @sndinfo={0x20, 0x84, 0x2, {0x0, 0x8, 0x7, 0xa4, r10}}], 0x50, 0x8008000}, {&(0x7f0000000740)=@in6={0xa, 0x4e23, 0x4, @private0, 0x9}, 0x1c, &(0x7f0000000a80)=[{&(0x7f0000000780)="6d07313a80a829a1d4cae6720a45bc042ab183511e219a54ed5b31dc2056392274d9e3bba56ca819e5d08d011c723b67b57d54aa60f1c6dc4b56bfbfbc1f5d62143dc4c9db9d987c0be1d8c9cf868cf71fb90334cb8631ce151a469af5c46c8bb772cb5bc0d7ff1aab701f0fd8b7ab7be5c078e7f0d89a5f2919d5f5fccadedd5a377326876012fd565d0025db985a5b3bdac30393594d92001c770fca0895ac64a4fb63aa65e40939b6b1f8c1e41a4eb296c590023305134066215f1b573632f24d6af86e73e1bb278e8337cb01e48f90bb3eaa8346dc5d2f1405a5d977aab862c977bf3c70db5e", 0xe8}, {&(0x7f0000000880)="462ed70e9335b1a80d2b44ae2f49bf9ac948ae9227fadbf3390a7e901e831211c10edd15faae9e86ab7bd6d029182c531194acbeb93b1d0df1ba4661219c62fa4924e3d0c2ea1c2a065dcf76686a41c21dcc79b9d4ba91b17510ea4139dd9f33c168721cbabcbe1028d8070db7d0cd1e66b22462fdd60d20da95c40d3cab18a34b5a9d4679d177992a8575619276ef51a0779f5827f9348923448b7323afecdc652c01e2a47f0f9bd5ba23df3c8bf1471cf092f8cb72a590aa6a25eed51a0d6b55ffc35d4dbf96e0f5", 0xc9}, {&(0x7f0000000980)="ab9a1dda6dbcba1ce1f1f8f63d8258ba066e6e26f582a7991e0360dbc6816bbab24f5eb4e52c3fb697279d0cc4118ab5eb6e2fd740b605319fc4bdbc0d8cc8187e4e9446c0b6336923426f1589ff00b59caf8754ef30025205ca18ce67ce55d5c21abeebfbf34682cad64db87c3658c2515a4679dc136b32957f80ffc256f9ca05c1262e5a613905ad", 0x89}, {&(0x7f0000000a40)="c9fda2b967cd85906a7f4a483054b66226a42af901af051f8c7d355b8ac1eef8", 0x20}], 0x4, 0x0, 0x0, 0x80}], 0x3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x56, 0x0, 0x0, 0x4800}, [@call={0x4e}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) 02:00:18 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$bpf(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x1008010, &(0x7f00000005c0)=ANY=[@ANYBLOB="6d6f64653d303030303030303030303030303d3030303031303030332c6d6f64653d30303030303030303030303030303030303030323030312c6d6f64653d30303030303030303030303030303030303030303030312c6d6f64653d30303030303030303030303030303030303230303030312c6d6f64653d30303030303030303030303030303030303037373737372c6d6f64653d30303030303030303030303030303030303030303030312c6d6f64653d30303030303030303030303030303030303030303037332c6d6f64653d30303030303030303030303030303030303030303030372c666f776e65723df14336ddcf48b2856e970cd4d619ca39a2884eac068a4391b4eadf5a65bfe4d192810000006eae6d48f4fec84eacf14d306c446a56556f7a530f27a26fee9cee8f10d476d4ec7560c27b1181028cffab6fdbfd2b8c92ad09958e6a361961a14e368194c3f1c7d5053b0a3dc57504380462eea484beab3e2e0107794b5ef856c915d7722c1a2c881e540d18cf6d4ec4d8efd0faa0823188be8f50aaafc0e5286b9a8796f42b1c6ef7820e0b685865256927ee74f5f597fdff394f33", @ANYRESDEC=r1, @ANYBLOB="2c6f626a5f747970653d27707070307b776c616e3070726f6376626f786e65743126766d6e657430002c6673757569643d39666235025a33382d343637342d663733362d320133332d63346636663955362c646f6e745f61707072616973652c7375626a5f726f6c653d27707070307b776c616e3070726f6376626f786e65743126766d6e657430002c00"]) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:18 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff09000000000000000000000000000100000e22"], 0x0) 02:00:18 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x40000, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000240)={0xc, {0x63, "04f06e13b2070da54ddfe9150b67bf7a6eab99858a64f6e244d87673529feb1e64ba16a37d8a188476d95b309cf303f060a7601a6c4e14c08af1a1ccca71351bba2cb325673602a16adfe6151cb7e420436322c06085f356778763279468111050848f"}}, 0x69) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202003100050fd25a80648c63940d0724fc601000324002000000051a82c137153e670800038014000000d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="475f000000000000c516000000000000050000000400000003000000000000000800000000000000fbfffffffffffffff2be0000000000000000000000000000000000000000000000080000000000000000000000000000fdffffffffffffff090000000000000000080000000000000000000000000000000000000000000009000000000000000000c05325a20000f8ffffffffffffff05000000000000003f0000000000000000000000000000000000000000000000803900"/200]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) r5 = dup(r4) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f00000002c0)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x2000, 0x1}) keyctl$read(0x12, 0xfffffffffffffffd, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0202003100050fd25a80648c63940d0724fc601000324002000000051a82c137153e670800038014000000d1bd", 0x33fe0}], 0x1}, 0x0) accept4$packet(r5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000340)=0x14, 0x800) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f00000001c0)) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r6, 0x8982, &(0x7f0000000000)={0x0, 'batadv0\x00', {0x81}, 0x4}) [ 786.539489][T27043] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 786.570228][T27046] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:18 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbffffffff3f000000000000000000000100000e22"], 0x0) 02:00:18 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') socketpair(0x1e, 0x3, 0xff, &(0x7f0000000440)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="03002dbd7000fedbdf25120000001800078008000100feffffff0c000300ffffffff00000000240003800800020002000000080001000100000008000200010000000800010005000000100004800906010073797a30000000000c00068008000100080000002990aa940acc29886eb9920ca8f05d7e1cc66435f878c0785517f9abdcad260b108bddb94da625d36645e5f8c944bc9372077d9c6492559a3e22ebf552bf36a5644fa0fcc40329c115b25797122d903071373110acdcf6fe1ba9e84bdb2b87a954eab56e0e63899bb898933faf0ca5eeb7cb868b50225a9348cbd524d832cb6418737b5fb3"], 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20048010) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup3(r8, r7, 0x0) dup(r9) r10 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0x5c, r10, 0x1, 0x70bd26, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) r11 = dup3(r1, r0, 0x0) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ACQUIRE(r12, 0x6430) 02:00:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0x80}, {0x80000006}]}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x1f4, 0x0, 0x78e428ac2d3c1a0) 02:00:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0xe) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:18 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02030000000000000000000000000100000e22"], 0x0) [ 786.833415][T27057] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 786.867869][T27060] __nla_validate_parse: 34 callbacks suppressed [ 786.867881][T27060] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, 0x140e, 0x100, 0x70bd26, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x800) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x2, 0x3, 0x100000001) bind$inet(r6, &(0x7f0000000080)={0x2, 0x0, @local}, 0x79) connect$inet(r6, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto(r6, &(0x7f0000000000)="e19a0e", 0x3, 0x20008002, 0x0, 0x0) write$binfmt_elf32(r6, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}}, 0x38) 02:00:18 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02050000000000000000000000000100000e22"], 0x0) [ 786.998377][T27065] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 787.070600][T27065] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:18 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02060000000000000000000000000100000e22"], 0x0) 02:00:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0xf) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:19 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x10001b4, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) close(r0) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000380)={0x2, "3069f3415e19fb3e6a6551e10695f5ca298e2f161d7fd08eabe42aa78bad4b4bd6df57eb8c805dcd8bbbd50a4db49c5c6e906afed1abee90e875d9fe4d1b37f3a347a242736f826c44b51f6b8905b4b10cd25f532df9ee6ed4b0aaf498b99267b8bec0f3f35eab8669809d5ca8acb3b1e64635cad5a500423d7168aba07ec0837f44da19aa6e"}, 0x8e, 0x0) msgrcv(r1, &(0x7f00000014c0)={0x0, ""/133}, 0x8d, 0x2, 0x1000) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000040)=""/248) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:00:19 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02070000000000000000000000000100000e22"], 0x0) [ 787.375048][T27078] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:19 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02080000000000000000000000000100000e22"], 0x0) 02:00:19 executing program 2: setrlimit(0x2, 0x0) r0 = add_key$user(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000500)='\x00', 0x1, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000200)={r0}, &(0x7f0000000540)=""/229, 0xe5, &(0x7f0000000240)={&(0x7f0000000080)={'crc32c-generic\x00'}}) keyctl$setperm(0x5, 0x0, 0x200) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xf, 0x4, 0x8, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000040)="d353ff072d68b2e4dc14aa5f7e25908384") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f00000002c0)={0x5, @raw_data="35b09dd4ed0fe1aabff7bac2941578a8cd2ef728bcf49264bab26e6527d26dd4bff6c5b997ea10d8e23972d3242f77648959a2827a1b0892aaf829f90797b68fae684314f6a6555f44a610048678b1a8980d662df1fc346713425cb96fd3621c43fef25ad7d52232b5fab2f6f28f5c2910931f15ac8d586cc208a82be3024efc714cfb2eecf948c97ad617db2dd058adb74e7b25fcb5e40e8fdb9fd6de34f56ab92ada3a336d7faea1cf55a53bfd849190f2b675213f55294b5839fbe5eeb08bda95b113305e0e3b"}) [ 787.497079][T27082] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:19 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000200)=@ethtool_pauseparam={0x13, 0x1, 0x3}}) 02:00:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x12) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:19 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02110000000000000000000000000100000e22"], 0x0) 02:00:19 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7, &(0x7f0000000640)=[{&(0x7f0000000240)="77a42d4e4af3d7ed0e7da340fb2b11a260801ba3934979ad9a2312b7217da11aed6e7099ef1ea53dbdd7604781fcc2d94ebb471e94f721760bc4390b5d156dd69ebdd4b99a37df05", 0x48, 0x10000}, {&(0x7f00000001c0)="236ed8633552e397ba179f3cd58b3392b5c462ccc38da437bf8904ad385bd148ab774bbfbda070b30b67792f6be7b7", 0x2f, 0x3}, {&(0x7f00000002c0)="88d8ecf5596bf8831d00808169bc2360b8c276416fa0aabfbf9478caa4984b62f083b034c8ea6bcaeaacbb496eec185a2822fbcad4cdd66a5185aef91df1f9d4855f9a87976ca26db5381abf4412274f9e69dec601e063ccecb5c9559a465bd3d6f9c35798", 0x65, 0x4000000000000000}, {&(0x7f0000000340)="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", 0xfe, 0x2}, {&(0x7f0000000440)="1a3c03f389c29a99", 0x8, 0x4}, {&(0x7f0000000480)="82ca5dba33a63d848631c43f1138033b4a966612e850a35b7c4151038cfeb679ccc12d25817f4d40bfdd6642ec1a830da614346d66d63e2634afbfd0829074d5a7fcac81f7949b5b30084ea7af8589f0fb28c0562a726578abc49fc32e076dbe89ec93908b405dca4082367ffb289b1e63e89c773c3bb934632ef73dad0b0618fe0c01ab", 0x84, 0x3}, {&(0x7f00000005c0)="9065cefdaa49540e0f4c3ee2b2ed978285ddc96ea9c65b511d4c7e307b6eccccc127938f0f7785fc50b31abde55b6d7d1546e81104b2e4639f71ef517c4e8b5ffe25a5dfb18bc1243cff111c31fc9dd1645b3022dd794885", 0x58, 0x60000}], 0x2800030, &(0x7f0000000700)=ANY=[@ANYBLOB='dsys_immutable,nocase,nodots,defcontext=staff_u,smackfstransmute=omfs\x00,audit,euid=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) dup(r6) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="18190fb40d00", @ANYRES16=r9, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r7, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="341c50d02316609b563e00ecd4112d0100", @ANYRES16=r9, @ANYBLOB="00012dbd7000fbdbdf251a000000050092000300000008009a000000000008009a000000000008009a0001000000"], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x20004080) sendmsg$NL80211_CMD_SET_STATION(r6, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x83270cf09d5a21d0}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x6c, r9, 0x800, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xa}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0xff, 0x2}}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x724}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xfff9}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @NL80211_ATTR_STA_CAPABILITY={0x6}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x4}]}, 0x6c}, 0x1, 0x0, 0x0, 0x5}, 0x40) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYRES64=r2, @ANYRES32=r3], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='omfs\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000280)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f00000002c0)=0x2c) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "cc76cdcf5dcf3db12002200000000000000100"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f00000001c0)={0xcda, 0x200, 0x101, 0xa7}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) dup(r4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) [ 787.742414][T27092] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 787.805602][T27095] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:19 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02300000000000000000000000000100000e22"], 0x0) [ 787.890888][T27095] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:19 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000000)=0xffff, 0x4) r3 = open(&(0x7f0000000040)='./file0\x00', 0x50000, 0x6) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f00000001c0)=""/4096) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:19 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) ioctl$FBIOGET_CON2FBMAP(r0, 0x460f, &(0x7f0000000000)={0x28, 0x1}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xe6, 0xafde}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x411, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6841}}, 0x20}}, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="341100001200100067cc7000fd215900000005000063e2000000000000000500000001000000b46e544e05000000", @ANYRES32=r7, @ANYBLOB="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"], 0x11b4}, 0x1, 0x0, 0x0, 0x40044}, 0x4000) r8 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) sendfile(r8, r8, 0x0, 0x8080fffffffe) 02:00:19 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02600000000000000000000000000100000e22"], 0x0) 02:00:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x14) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 788.093265][T27109] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 788.120973][T27112] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:19 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xad, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x12000005f) 02:00:20 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000300000000000000000000000100000e22"], 0x0) 02:00:20 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000400)={&(0x7f0000000000)="4a2d4904ce93cb60b0885c2f81343d7a3ee2f9a963639cd9e4606df130e0a672e8e789b71849e33f1f57f7f1357a9ebb8040610e4e377c82a94fa20ab438efc2b599fc4430b7ba0b29c782cf0790c4988dc14c6cf334d5a34b1550c0d5c54cd1f58b88e120ed71a2bcab9d4c40d14e2ad82815ed713519a1df289a263941373886919e665cb1fd70800744aefe1c2377b0a194a136176a91bdb35e45b48729a84ca44db45245401f223392cef1afd52ab4a64957628812913adddcdc27", &(0x7f00000001c0)=""/250, &(0x7f00000002c0)="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", &(0x7f00000003c0)="d9", 0x4}, 0x38) [ 788.243009][T27117] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 788.313068][T27121] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:20 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000500000000000000000000000100000e22"], 0x0) 02:00:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getpgid(0x0) fchdir(r0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fstatfs(r2, &(0x7f0000000280)=""/24) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(0xffffffffffffffff, r3, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, 0x0, &(0x7f0000000080)) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_RES_GET(r5, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x7024028a}, 0xc, &(0x7f0000000480)={&(0x7f0000000240)={0x28, 0x1409, 0x100, 0x70bd28, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4010}, 0x40881) [ 788.391711][T27125] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 788.415669][T27127] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x15) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:20 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000600000000000000000000000100000e22"], 0x0) 02:00:20 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f00000000c0)=0x1) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f00000002c0)={0x7, 0x1c, [0x3ff, 0x0, 0x1, 0x9, 0x7, 0xd103, 0x3]}) r2 = open(&(0x7f0000000240)='./bus\x00', 0x105010, 0x0) openat(r1, &(0x7f0000000140)='./bus\x00', 0x100, 0x80) read$fb(r0, &(0x7f00000001c0)=""/96, 0x60) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x12, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r3) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f00000003c0)={0x9a0000, 0x1ff, 0x4, r2, 0x0, &(0x7f0000000380)={0x990a61, 0x6e, [], @p_u16=&(0x7f0000000300)=0x6}}) socket$inet_udp(0x2, 0x2, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8)=0xe00, 0x8000fffffffe) 02:00:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x16) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:20 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000700000000000000000000000100000e22"], 0x0) 02:00:20 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IMCLEAR_L2(r4, 0x80044946, &(0x7f0000000040)=0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000800400b19653c762f083b57c3c"], 0x2c}}, 0x0) 02:00:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r2 = socket(0x10, 0x803, 0x0) r3 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r3, 0x208200) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r3, 0xc2604111, &(0x7f0000000440)={0x1, [[0x2, 0x97bc, 0x8, 0x80, 0x3, 0x6, 0x6, 0x8000], [0x2, 0x0, 0xb, 0xfffffff9, 0x400, 0x10000, 0x7, 0x8], [0x8, 0x0, 0x1000, 0xfff, 0x82, 0x7f, 0xffffffff, 0x5]], [], [{0x7f4, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8001, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x1, 0x3f9e, 0x0, 0x0, 0x1}, {0xffffffff, 0x800, 0x1, 0x1, 0x1}, {0x1, 0x8, 0x0, 0x1, 0x1}, {0x2, 0x1, 0x0, 0x1}, {0x5, 0x943, 0x0, 0x0, 0x1}, {0x7, 0x1, 0x1, 0x1, 0x0, 0x1}, {0x6, 0x29d, 0x1, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x1}, {0x0, 0x9, 0x1, 0x0, 0x1}, {0x2, 0x7, 0x1, 0x1, 0x1, 0x1}], [], 0x2}) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="210f0000000045000000070000e207100300", @ANYRES32=r4, @ANYBLOB], 0x1c}}, 0x0) 02:00:20 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02001100000000000000000000000100000e22"], 0x0) 02:00:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x18) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:20 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000001c0)={r6}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup3(r8, r7, 0x0) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r10, 0x84, 0x22, &(0x7f0000000000)={0x8, 0x204, 0x0, 0x4, r6}, &(0x7f0000000040)=0x10) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:20 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02002000000000000000000000000100000e22"], 0x0) 02:00:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x2, 0x2812, r2, 0x0) r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r3, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000040)=ANY=[], 0xfd30) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r4, 0x0) 02:00:21 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shmctl$SHM_LOCK(0x0, 0xb) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='reiserfs\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x2) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r5, 0x4112, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$FIONCLEX(r3, 0x5450) 02:00:21 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000000)="020181ffffff0a000000ff45ac0480ffffffa500e931190000000000000675fffff0bf000000e100e2ff877700720030070082ffffff00000000008000da55aa", 0x40, 0x1c0}, {&(0x7f00000000c0)="b54da2cdc12e686f1d33b50b9aaa97eb4bce5430a1a66086d05451329eb92dab85144d169fabcc3ad896002959b581c41b00b0a5bbd361f46a127ee481eaaf8dad63207b472018d570b55305a2c965783ea711eaff0372ea73556d045a2c8f1a3eeda13ab0c23a3e8d8f8462c1e1163d13cbcb1069698b065d226fc968d8a7bd8d344e50d541b2c7335ce7a5ae0d948e7eb08646b18605e654faaa683edac3401b6ebbd602d6ac44dab2c34e83a1f3b4ae296e784beaf2b7e5c81d759c4a8739a3bdf975f139d19ce07b0e2262ca7c", 0xcf, 0xf1}]) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x90180, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x82, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000240)={0xd48b, 0x1}) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0x7, 0x4b, 0x1}, 0x7) 02:00:21 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02003000000000000000000000000100000e22"], 0x0) [ 789.365680][T27166] [ 789.368222][T27166] ===================================================== [ 789.376827][T27166] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 789.384371][T27166] 5.7.0-rc1-next-20200415-syzkaller #0 Not tainted [ 789.391040][T27166] ----------------------------------------------------- [ 789.398156][T27166] syz-executor.0/27166 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 789.407082][T27166] ffffffff89a620f8 (shmlock_user_lock){+.+.}-{2:2}, at: user_shm_lock+0xab/0x230 02:00:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x37c, 0x3f}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x6) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) openat$mice(0xffffffffffffff9c, 0x0, 0x0) close(r0) [ 789.416212][T27166] [ 789.416212][T27166] and this task is already holding: [ 789.423582][T27166] ffff888095322e98 (&info->lock){....}-{2:2}, at: shmem_lock+0x4a/0x2d0 [ 789.433012][T27166] which would create a new lock dependency: [ 789.438911][T27166] (&info->lock){....}-{2:2} -> (shmlock_user_lock){+.+.}-{2:2} [ 789.446556][T27166] [ 789.446556][T27166] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 789.456000][T27166] (&xa->xa_lock#4){..-.}-{2:2} [ 789.456018][T27166] [ 789.456018][T27166] ... which became SOFTIRQ-irq-safe at: [ 789.468592][T27166] lock_acquire+0x1f2/0x8f0 [ 789.473193][T27166] _raw_spin_lock_irqsave+0x8c/0xbf [ 789.478532][T27166] test_clear_page_writeback+0x1d7/0x11e0 [ 789.484489][T27166] end_page_writeback+0x239/0x520 [ 789.489703][T27166] end_buffer_async_write+0x442/0x5c0 [ 789.495431][T27166] end_bio_bh_io_sync+0xe2/0x140 [ 789.500531][T27166] bio_endio+0x46a/0x820 [ 789.504975][T27166] blk_update_request+0x3e1/0xdc0 [ 789.510163][T27166] scsi_end_request+0x80/0x7b0 02:00:21 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02004000000000000000000000000100000e22"], 0x0) [ 789.515023][T27166] scsi_io_completion+0x1e7/0x1300 [ 789.520225][T27166] scsi_softirq_done+0x31e/0x3b0 [ 789.525345][T27166] blk_done_softirq+0x2db/0x440 [ 789.530339][T27166] __do_softirq+0x26c/0x9f7 [ 789.535331][T27166] irq_exit+0x192/0x1d0 [ 789.539579][T27166] do_IRQ+0xda/0x270 [ 789.544650][T27166] ret_from_intr+0x0/0x2b [ 789.549130][T27166] write_comp_data+0x2e/0x80 [ 789.553816][T27166] filemap_map_pages+0x402/0x1370 [ 789.559234][T27166] __handle_mm_fault+0x2de8/0x3ac0 [ 789.564439][T27166] handle_mm_fault+0x1a5/0x660 [ 789.569295][T27166] do_page_fault+0x55b/0x13da [ 789.574061][T27166] page_fault+0x39/0x40 [ 789.578298][T27166] [ 789.578298][T27166] to a SOFTIRQ-irq-unsafe lock: [ 789.586004][T27166] (shmlock_user_lock){+.+.}-{2:2} [ 789.586019][T27166] [ 789.586019][T27166] ... which became SOFTIRQ-irq-unsafe at: [ 789.599224][T27166] ... [ 789.599246][T27166] lock_acquire+0x1f2/0x8f0 [ 789.606421][T27166] _raw_spin_lock+0x2a/0x40 [ 789.611028][T27166] user_shm_lock+0xab/0x230 02:00:21 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x82, &(0x7f0000001a80)=""/4141, &(0x7f0000000100)=0x102d) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$IP_SET_OP_VERSION(r2, 0x1, 0x53, &(0x7f0000000040), &(0x7f00000000c0)=0x8) [ 789.615717][T27166] hugetlb_file_setup+0x4e1/0x677 [ 789.621430][T27166] newseg+0x460/0xe60 [ 789.625565][T27166] ipcget+0xf0/0xcb0 [ 789.629646][T27166] __x64_sys_shmget+0x139/0x1a0 [ 789.634591][T27166] do_syscall_64+0xf6/0x7d0 [ 789.639189][T27166] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 789.645185][T27166] [ 789.645185][T27166] other info that might help us debug this: [ 789.645185][T27166] [ 789.655949][T27166] Chain exists of: [ 789.655949][T27166] &xa->xa_lock#4 --> &info->lock --> shmlock_user_lock [ 789.655949][T27166] [ 789.668874][T27166] Possible interrupt unsafe locking scenario: [ 789.668874][T27166] [ 789.677193][T27166] CPU0 CPU1 [ 789.682567][T27166] ---- ---- [ 789.688468][T27166] lock(shmlock_user_lock); [ 789.693058][T27166] local_irq_disable(); [ 789.700428][T27166] lock(&xa->xa_lock#4); [ 789.707280][T27166] lock(&info->lock); [ 789.713865][T27166] 02:00:21 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) open(&(0x7f0000000000)='./file0\x00', 0x8001141042, 0x0) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0xb, "d51dc633fb946d49"}, 0xa, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) [ 789.717315][T27166] lock(&xa->xa_lock#4); [ 789.721816][T27166] [ 789.721816][T27166] *** DEADLOCK *** [ 789.721816][T27166] [ 789.730057][T27166] 3 locks held by syz-executor.0/27166: [ 789.735604][T27166] #0: ffffffff899befc0 (rcu_read_lock){....}-{1:2}, at: shmctl_do_lock+0x0/0x8f0 [ 789.744818][T27166] #1: ffff88809afcd818 (&new->lock#2){+.+.}-{2:2}, at: shmctl_do_lock+0x207/0x8f0 [ 789.754823][T27166] #2: ffff888095322e98 (&info->lock){....}-{2:2}, at: shmem_lock+0x4a/0x2d0 [ 789.763713][T27166] [ 789.763713][T27166] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 789.774212][T27166] -> (&xa->xa_lock#4){..-.}-{2:2} { [ 789.779528][T27166] IN-SOFTIRQ-W at: [ 789.783613][T27166] lock_acquire+0x1f2/0x8f0 [ 789.789951][T27166] _raw_spin_lock_irqsave+0x8c/0xbf [ 789.796982][T27166] test_clear_page_writeback+0x1d7/0x11e0 [ 789.804534][T27166] end_page_writeback+0x239/0x520 [ 789.811394][T27166] end_buffer_async_write+0x442/0x5c0 [ 789.818641][T27166] end_bio_bh_io_sync+0xe2/0x140 [ 789.825412][T27166] bio_endio+0x46a/0x820 [ 789.831490][T27166] blk_update_request+0x3e1/0xdc0 [ 789.838349][T27166] scsi_end_request+0x80/0x7b0 [ 789.851838][T27166] scsi_io_completion+0x1e7/0x1300 [ 789.858905][T27166] scsi_softirq_done+0x31e/0x3b0 02:00:21 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000b0f00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000008000100636273001c000200180001"], 0x48}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x7f, 0x61, 0x10, 0x14, 0x803}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xcd, &(0x7f00000003c0)=""/205, 0x0, 0x0, [], r2, 0x14, r6, 0x8, &(0x7f0000000000)={0x0, 0x4000000}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10, 0x0, r6}, 0x78) [ 789.865687][T27166] blk_done_softirq+0x2db/0x440 [ 789.872703][T27166] __do_softirq+0x26c/0x9f7 [ 789.879040][T27166] irq_exit+0x192/0x1d0 [ 789.885031][T27166] do_IRQ+0xda/0x270 [ 789.891111][T27166] ret_from_intr+0x0/0x2b [ 789.897275][T27166] write_comp_data+0x2e/0x80 [ 789.904060][T27166] filemap_map_pages+0x402/0x1370 [ 789.910920][T27166] __handle_mm_fault+0x2de8/0x3ac0 [ 789.921967][T27166] handle_mm_fault+0x1a5/0x660 [ 789.928672][T27166] do_page_fault+0x55b/0x13da [ 789.935701][T27166] page_fault+0x39/0x40 [ 789.941681][T27166] INITIAL USE at: [ 789.945951][T27166] lock_acquire+0x1f2/0x8f0 [ 789.952283][T27166] _raw_spin_lock_irq+0x5b/0x80 [ 789.958881][T27166] __add_to_page_cache_locked+0x607/0xe00 [ 789.966535][T27166] add_to_page_cache_lru+0x1aa/0x700 [ 789.973683][T27166] do_read_cache_page+0x9ab/0x1810 [ 789.980604][T27166] read_part_sector+0xf6/0x600 [ 789.993368][T27166] adfspart_check_ICS+0x9d/0xc80 [ 790.000104][T27166] blk_add_partitions+0x474/0xe50 [ 790.006916][T27166] bdev_disk_changed+0x1fb/0x380 [ 790.013602][T27166] __blkdev_get+0xb15/0x1530 [ 790.019953][T27166] blkdev_get+0x41/0x2b0 [ 790.025943][T27166] __device_add_disk+0xa4f/0x1170 [ 790.034273][T27166] brd_init+0x297/0x463 [ 790.040178][T27166] do_one_initcall+0x10a/0x7d0 [ 790.046767][T27166] kernel_init_freeable+0x501/0x5ae [ 790.053712][T27166] kernel_init+0xd/0x1bb [ 790.059711][T27166] ret_from_fork+0x24/0x30 [ 790.070761][T27166] } [ 790.073423][T27166] ... key at: [] __key.18068+0x0/0x40 [ 790.080955][T27166] ... acquired at: [ 790.084901][T27166] _raw_spin_lock_irqsave+0x8c/0xbf [ 790.090366][T27166] shmem_uncharge+0x24/0x270 [ 790.095196][T27166] split_huge_page_to_list+0x274b/0x33b0 [ 790.101011][T27166] shmem_punch_compound+0x13e/0x1e0 [ 790.106494][T27166] shmem_undo_range+0x5f1/0x1b80 [ 790.111617][T27166] shmem_fallocate+0xbe2/0xd40 [ 790.116564][T27166] vfs_fallocate+0x48a/0xa10 [ 790.121340][T27166] ksys_fallocate+0x51/0x90 [ 790.126022][T27166] __x64_sys_fallocate+0x93/0xf0 [ 790.131148][T27166] do_syscall_64+0xf6/0x7d0 [ 790.135861][T27166] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 790.142696][T27166] [ 790.145813][T27166] -> (&info->lock){....}-{2:2} { [ 790.150756][T27166] INITIAL USE at: [ 790.154698][T27166] lock_acquire+0x1f2/0x8f0 [ 790.160781][T27166] _raw_spin_lock_irq+0x5b/0x80 [ 790.168157][T27166] shmem_getpage_gfp+0x937/0x2a10 [ 790.174751][T27166] shmem_write_begin+0x102/0x1e0 [ 790.181257][T27166] generic_perform_write+0x20a/0x4e0 [ 790.188117][T27166] __generic_file_write_iter+0x24c/0x610 [ 790.195332][T27166] generic_file_write_iter+0x3f3/0x630 [ 790.202408][T27166] new_sync_write+0x4a2/0x700 [ 790.208660][T27166] __vfs_write+0xc9/0x100 [ 790.214565][T27166] vfs_write+0x268/0x5d0 [ 790.220796][T27166] ksys_write+0x12d/0x250 [ 790.226794][T27166] do_syscall_64+0xf6/0x7d0 [ 790.232878][T27166] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 790.240326][T27166] } [ 790.242844][T27166] ... key at: [] __key.56628+0x0/0x40 [ 790.251860][T27166] ... acquired at: [ 790.255702][T27166] lock_acquire+0x1f2/0x8f0 [ 790.260391][T27166] _raw_spin_lock+0x2a/0x40 [ 790.265083][T27166] user_shm_lock+0xab/0x230 [ 790.269778][T27166] shmem_lock+0x1dd/0x2d0 [ 790.274308][T27166] shmctl_do_lock+0x73f/0x8f0 [ 790.279190][T27166] ksys_shmctl.constprop.0+0x203/0x350 [ 790.284831][T27166] do_syscall_64+0xf6/0x7d0 [ 790.289515][T27166] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 790.295583][T27166] [ 790.297906][T27166] [ 790.297906][T27166] the dependencies between the lock to be acquired [ 790.297912][T27166] and SOFTIRQ-irq-unsafe lock: [ 790.311518][T27166] -> (shmlock_user_lock){+.+.}-{2:2} { [ 790.317089][T27166] HARDIRQ-ON-W at: [ 790.321083][T27166] lock_acquire+0x1f2/0x8f0 [ 790.327243][T27166] _raw_spin_lock+0x2a/0x40 [ 790.334099][T27166] user_shm_lock+0xab/0x230 [ 790.340265][T27166] hugetlb_file_setup+0x4e1/0x677 [ 790.347298][T27166] newseg+0x460/0xe60 [ 790.352940][T27166] ipcget+0xf0/0xcb0 [ 790.358586][T27166] __x64_sys_shmget+0x139/0x1a0 [ 790.365102][T27166] do_syscall_64+0xf6/0x7d0 [ 790.371266][T27166] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 790.378801][T27166] SOFTIRQ-ON-W at: [ 790.382801][T27166] lock_acquire+0x1f2/0x8f0 [ 790.389050][T27166] _raw_spin_lock+0x2a/0x40 [ 790.395480][T27166] user_shm_lock+0xab/0x230 [ 790.401663][T27166] hugetlb_file_setup+0x4e1/0x677 [ 790.408522][T27166] newseg+0x460/0xe60 [ 790.414945][T27166] ipcget+0xf0/0xcb0 [ 790.420501][T27166] __x64_sys_shmget+0x139/0x1a0 [ 790.427186][T27166] do_syscall_64+0xf6/0x7d0 [ 790.433527][T27166] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 790.441089][T27166] INITIAL USE at: [ 790.444996][T27166] lock_acquire+0x1f2/0x8f0 [ 790.451066][T27166] _raw_spin_lock+0x2a/0x40 [ 790.457133][T27166] user_shm_lock+0xab/0x230 [ 790.463203][T27166] hugetlb_file_setup+0x4e1/0x677 [ 790.469802][T27166] newseg+0x460/0xe60 [ 790.477178][T27166] ipcget+0xf0/0xcb0 [ 790.482643][T27166] __x64_sys_shmget+0x139/0x1a0 [ 790.489065][T27166] do_syscall_64+0xf6/0x7d0 [ 790.495160][T27166] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 790.504278][T27166] } [ 790.507058][T27166] ... key at: [] shmlock_user_lock+0x18/0x5c0 [ 790.515223][T27166] ... acquired at: [ 790.519040][T27166] lock_acquire+0x1f2/0x8f0 [ 790.523738][T27166] _raw_spin_lock+0x2a/0x40 [ 790.528441][T27166] user_shm_lock+0xab/0x230 [ 790.533127][T27166] shmem_lock+0x1dd/0x2d0 [ 790.538768][T27166] shmctl_do_lock+0x73f/0x8f0 [ 790.543971][T27166] ksys_shmctl.constprop.0+0x203/0x350 [ 790.549610][T27166] do_syscall_64+0xf6/0x7d0 [ 790.554287][T27166] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 790.560339][T27166] [ 790.562662][T27166] [ 790.562662][T27166] stack backtrace: [ 790.568645][T27166] CPU: 1 PID: 27166 Comm: syz-executor.0 Not tainted 5.7.0-rc1-next-20200415-syzkaller #0 [ 790.578555][T27166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.590083][T27166] Call Trace: [ 790.593384][T27166] dump_stack+0x188/0x20d [ 790.597893][T27166] check_irq_usage.cold+0x566/0x6de [ 790.603120][T27166] ? check_usage_forwards+0x4e0/0x4e0 [ 790.608716][T27166] ? kernel_text_address+0x6e/0xe0 [ 790.614143][T27166] ? arch_stack_walk+0x84/0xd0 [ 790.618951][T27166] ? check_path+0x22/0x40 [ 790.623289][T27166] ? check_noncircular+0x16d/0x3e0 [ 790.628409][T27166] ? print_circular_bug.isra.0+0x3a0/0x3a0 [ 790.634322][T27166] ? mark_lock+0x12b/0xf10 [ 790.638837][T27166] ? print_usage_bug+0x240/0x240 [ 790.643783][T27166] ? __lock_acquire+0x2ac9/0x4c50 [ 790.648809][T27166] __lock_acquire+0x2ac9/0x4c50 [ 790.653668][T27166] ? mark_held_locks+0xe0/0xe0 [ 790.658437][T27166] lock_acquire+0x1f2/0x8f0 [ 790.662983][T27166] ? user_shm_lock+0xab/0x230 [ 790.667704][T27166] ? shmem_lock+0x4a/0x2d0 [ 790.672125][T27166] ? lock_release+0x800/0x800 [ 790.677331][T27166] ? lock_release+0x800/0x800 [ 790.682019][T27166] ? do_raw_spin_lock+0x129/0x2e0 [ 790.687182][T27166] _raw_spin_lock+0x2a/0x40 [ 790.691788][T27166] ? user_shm_lock+0xab/0x230 [ 790.696657][T27166] user_shm_lock+0xab/0x230 [ 790.701190][T27166] shmem_lock+0x1dd/0x2d0 [ 790.705708][T27166] shmctl_do_lock+0x73f/0x8f0 [ 790.710580][T27166] ksys_shmctl.constprop.0+0x203/0x350 [ 790.716052][T27166] ? compat_ksys_shmctl+0x560/0x560 [ 790.721270][T27166] ? __might_fault+0x190/0x1d0 [ 790.726041][T27166] ? _copy_to_user+0x126/0x160 [ 790.730876][T27166] ? put_timespec64+0xcb/0x120 [ 790.735684][T27166] ? ns_to_kernel_old_timeval+0x100/0x100 [ 790.741550][T27166] ? __x64_sys_futex+0x380/0x4f0 [ 790.746500][T27166] ? __x64_sys_clock_gettime+0x165/0x240 [ 790.752231][T27166] ? __ia32_sys_clock_settime+0x260/0x260 [ 790.757949][T27166] ? trace_hardirqs_off_caller+0x55/0x230 [ 790.763867][T27166] do_syscall_64+0xf6/0x7d0 [ 790.768465][T27166] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 790.774621][T27166] RIP: 0033:0x45ca29 [ 790.778616][T27166] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 790.798336][T27166] RSP: 002b:00007f4af423fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001f [ 790.806749][T27166] RAX: ffffffffffffffda RBX: 0000000000506700 RCX: 000000000045ca29 [ 790.814722][T27166] RDX: 0000000000000000 RSI: 000000000000000b RDI: 0000000000000000 [ 790.822792][T27166] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 790.830869][T27166] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 790.838958][T27166] R13: 0000000000000b63 R14: 00000000004cdba6 R15: 00007f4af42406d4 02:00:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x19) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0xffffff0f00000000, 0x40, 0x0, 0xfffffffffffffcfb) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x2004cfad, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7ff) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 02:00:22 executing program 0: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0xa7, 0x6, 0x40}, {0x91d9, 0x3, 0x1f, 0x5}, {0x9, 0x40, 0xa7, 0x5}]}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYRESOCT=r1, @ANYRES32=r5, @ANYRESHEX=r2, @ANYRES32=r3, @ANYRESDEC=r4], &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ubifs\x00', 0x1834824, &(0x7f0000000080)='\'ppp0{\x00\x00an0procvboxnet1&vmnet0\x00U\x1ctf\xef\\\x04\x19V|\xb2\xa4\xc3\x95\x1a,S\xcb\xc7\'\x94J]\x9164\xb8eX+U\x92\xf6WQ\xe4=\xd6)\x03\xdbD_\xcd7&?| 1') 02:00:22 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02006000000000000000000000000100000e22"], 0x0) 02:00:22 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02004000000000000000000000000100000e22"], 0x0) 02:00:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000000)={@remote, 0x4d}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x117) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:22 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff0200ff00000000000000000000000100000e22"], 0x0) 02:00:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x48) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:22 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02004000000000000000000000000100000e22"], 0x0) 02:00:22 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) nanosleep(&(0x7f0000000040)={r0, r1+10000000}, &(0x7f0000000080)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 791.129893][T27200] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 791.147593][T27201] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:23 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000010000000000000000000100000e22"], 0x0) 02:00:23 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02004000000000000000000000000100000e22"], 0x0) 02:00:23 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000030000000000000000000100000e22"], 0x0) [ 791.339399][T27217] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:23 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) vmsplice(r0, &(0x7f0000000400)=[{&(0x7f0000000000)="ca899ea35b084399a5b4f69ec1bb6e3c962ffe82f0d82692f0df773f4f84ce5715c39ce6c93c57370845c6a732d1c138729bae44fdd6b8f17d6405262a1f9417c0878061d3de98ede5a674fc40bacab43b74ae0301747b9e471fb0b206c31800cc92c0ad0861", 0x66}, {&(0x7f0000000080)="9e43f643d93c9f9d59f48286af7ad17515d639c8038776c6a47a54c05fa7e4883985d2b9bfa3a2561ae547fd0d2f6d5a7417c8c4260bf356a1e0d712d4", 0x3d}, {&(0x7f00000001c0)="0fbbab51ed7ec62fca00960d8cf2efd62bd4aaff5ff92a71304035f1eff517389d36f844edf023fc88f65e55185445a29675a2a1f1706f62c35041ae755f3ed0448c0c3ee3ffe8af5ba8080ecd63945616ea255012ceba0e7649247c5dbb45ac06437f01d17c2ae430e7c28609931bca2e28d3e4b767fd0b11cc9922b9c00e961aaba6a258155e5b7e6cb1a3541b4a59bdcd40b57191ca1090aed50cd3cad94c826967df9d61884a2071a9ff7bb8c5d6f44e44f871275afd3bcda176da797f41bd7f6b4a277cd784bced09", 0xcb}, {&(0x7f00000002c0)='5', 0x1}, {&(0x7f0000000300)="d4874cff067c13b6d20cb018a2e01e46c8322c13afa77e19edacc9ab3bbba14dba59596bd8156d2cb139332226cde47dc3ea6a6758e89422a5a503d73dea57039402fb51aaeac21380c1fb5389952cad0227f85eed18ac18c9e7fe499416d6fbe28b2230454036faaaba4c91da31b4b927a4b4286100a2cca85a46bb99c2ebbe6039642f7c66200c952148d1032841417ad16f46a4e7f90eaddd63d9f507e765aa390ef7884008bdfdfdee7654218f5d19fddc85671ccd371da79bfe6041da0ffc891dde8ff8585a9f9d7e14309de515bea35c614ad0b46cb0eecea3df58be76828dac032b12e9c3ccb142145e", 0xed}], 0x5, 0xe) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') open$dir(&(0x7f0000000480)='./file0\x00', 0x508001, 0x20) 02:00:23 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) socket$inet6_udp(0xa, 0x2, 0x0) socketpair(0x22, 0x80000, 0x57, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private0={0xfc, 0x0, [], 0x1}}}}, 0x108) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$VIDIOC_OVERLAY(r3, 0x4004560e, &(0x7f0000000280)=0xfaed) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000180)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0)}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x9, @mcast2, 0x5}, @in={0x2, 0x4e21, @multicast2}}}, 0x118) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xd1) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="6c005920e68ddcb5000055f5e05b38dcc2b860a96a1515ed010000800010001f", @ANYRES32=0x0, @ANYBLOB="08000000000000003c0012800900010069706970000000002c000280080003007f000001060011004e24000008000100", @ANYRES32=r6, @ANYBLOB="08001400050000adbcb165000400130008000a00a4c9d52e3b3084c44d150c66fd3662699de24ceeadf6c58c5554f3a74f59940211ccc8ab41d43011d1762eda3dc85274a0ccb4359334dc267f1c7c1a4165a8081beb77a7760af0d9d10d5ae11d17028567fe12e7f96654458e40e848d8dade0152f7e3a2570904073b7fa779cc70c4", @ANYRES32=r6, @ANYBLOB="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"], 0x6c}}, 0x4000000) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 02:00:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x4c) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:23 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000050000000000000000000100000e22"], 0x0) 02:00:23 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000000)={0x3, 0x70, 0x6, 0x7e, 0x2, 0x8, 0x0, 0x2c6400, 0x40408, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x1, 0x100000001}, 0x800, 0x8, 0x6, 0x1, 0x0, 0xda8d, 0x7fff}) [ 791.506689][T27228] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 791.522179][T27230] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:23 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) nanosleep(&(0x7f0000000040)={r0, r1+10000000}, &(0x7f0000000080)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:23 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) nanosleep(&(0x7f0000000040)={r0, r1+10000000}, &(0x7f0000000080)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') [ 791.613988][T27238] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:23 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000060000000000000000000100000e22"], 0x0) [ 791.655118][T27242] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x60) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:23 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='cgroup\x00', 0x40, 0x122, &(0x7f0000000040)={0xffffffffffffffc3, 0x0, 0x101, 0x9}) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:23 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) nanosleep(&(0x7f0000000040)={r0, r1+10000000}, &(0x7f0000000080)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:23 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000070000000000000000000100000e22"], 0x0) 02:00:23 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_S_MODULATOR(r4, 0x40445637, &(0x7f0000000100)={0x3, "11f21d5604fd4cc3095a2106dcb0830f42f6ff268b3c2c648546f30afa46f963", 0x200, 0x1, 0x6, 0x2, 0x3}) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0x4020565b, &(0x7f00000000c0)={0xbf10681d2b5f5d81}) [ 791.822465][T27254] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 791.907950][T27252] __nla_validate_parse: 23 callbacks suppressed [ 791.907959][T27252] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:23 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='tracefs\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) 02:00:23 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000080000000000000000000100000e22"], 0x0) 02:00:23 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='cgroup\x00', 0x40, 0x122, &(0x7f0000000040)={0xffffffffffffffc3, 0x0, 0x101, 0x9}) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:23 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='cgroup\x00', 0x40, 0x122, &(0x7f0000000040)={0xffffffffffffffc3, 0x0, 0x101, 0x9}) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x20) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x68) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:23 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000110000000000000000000100000e22"], 0x0) 02:00:24 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='cgroup\x00', 0x40, 0x122, &(0x7f0000000040)={0xffffffffffffffc3, 0x0, 0x101, 0x9}) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000200000000000000000000100000e22"], 0x0) [ 792.207132][T27279] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 792.221433][T27280] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 792.243808][T27283] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 792.307863][T27285] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000300000000000000000000100000e22"], 0x0) [ 792.381489][T27285] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:24 executing program 2: openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80020, 0x0) r0 = socket$pppl2tp(0x18, 0x1, 0x1) syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0xfffffffffffffe00, 0x101000) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x52002009}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x50, 0x1407, 0x400, 0x70bd26, 0x25dfdbfd, "", [@RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x1) r6 = dup3(r5, r4, 0x0) dup(r6) r7 = pidfd_getfd(r6, r0, 0x0) ioctl$PPPIOCATTCHAN(r7, 0x40047438, &(0x7f0000000340)=0x4) setuid(r3) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in=@private=0xa010100, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x8, 0x4e22, 0x4, 0xa, 0x20, 0x20, 0x2c, 0x0, r3}, {0x7, 0x3f, 0x401, 0x2, 0xffffffffffffca2a, 0xc362, 0x5, 0x8000}, {0x5, 0x100000001, 0x10000, 0xcc1a}, 0x5, 0x6e6bba, 0x2, 0x0, 0x2, 0x3}, {{@in=@private=0xa010101, 0x4d2, 0x32}, 0x2, @in=@rand_addr=0x64010102, 0x3507, 0x3, 0x1, 0x7, 0xfffffff7, 0x0, 0x5}}, 0xe8) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r8, 0x40045532, &(0x7f00000001c0)=0x8) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r9+30000000}, 0x0) 02:00:24 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x801, 0x200000) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') r0 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x7, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = dup3(r3, r1, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto$llc(r5, &(0x7f0000000240)="4d735222c47b3409db5e2125634d9cbe45a49f15875062338749f93af4ec62e4e4cb317d7a2716b2798176aa016814a52b9c133219bc822a8a274e1765a9de19c04d3c25c9ec6398ec48896e05749855073e2570fd65ecd6ba20c9a03d23c6da07542af3bba99ebfc5210b5a4fde2e370e1ee1472307453548d3a15be2f34b5ee4b02d201fad5dc23462642260ca61bec330aaed6cc58e621183c33a0476b8293b54407ddc9bce87279020abe8fe04", 0xaf, 0x24040880, &(0x7f0000000300)={0x1a, 0x301, 0x81, 0x0, 0x7, 0x95, @random="fbaf8c02d19c"}, 0x10) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r6, &(0x7f0000000200)={0x8}) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x80000, 0x0) ioctl$BLKROGET(r7, 0x125e, &(0x7f0000000080)) 02:00:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x6c) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000400000000000000000000100000e22"], 0x0) 02:00:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x68) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 792.574172][T27299] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 792.594918][T27300] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:24 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x1, &(0x7f0000000000)) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000600000000000000000000100000e22"], 0x0) 02:00:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x68) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 792.678014][T27303] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02ffffff8d0000000000000000000100000e22"], 0x0) [ 792.740104][T27303] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 792.750512][T27310] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 792.765017][T27312] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x68) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x74) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02fffffff50000000000000000000100000e22"], 0x0) 02:00:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$snddsp(0xffffffffffffffff, &(0x7f0000000140)=""/200, 0xc8) [ 792.977491][T27323] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:24 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000ff0000000000000000000100000e22"], 0x0) [ 793.048104][T27329] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. [ 793.109437][T27329] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 02:00:25 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff028dffffff0000000000000000000100000e22"], 0x0) 02:00:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000200)=@v1={0x0, @adiantum, 0x4, "7bbc31a142cb4342"}) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000001c0)={r7}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000000)={0xffff, 0x3, 0x0, 0xd2, 0x1, 0x100, 0x3, 0xfffffffd, r7}, &(0x7f0000000040)=0x20) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x7a) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:25 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02f5ffffff0000000000000000000100000e22"], 0x0) 02:00:25 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x208, 0xf8, 0x208, 0x0, 0xf8, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "8c6f", 0x2}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a], 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) dup(r3) r4 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_CROP(r9, 0xc038563c, &(0x7f00000000c0)={0x0, 0x0, {0xffffffff, 0x5bb, 0x1, 0xffff}}) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r11) write$P9_RGETATTR(r3, &(0x7f0000000000)={0xa0, 0x19, 0x1, {0x904, {0x1, 0x2, 0x2}, 0xd3, r5, r11, 0xdd3, 0xabb6, 0x400, 0x4, 0x2, 0x7, 0x80, 0x3, 0x9, 0x8, 0x1, 0x0, 0x4, 0x578187db, 0x100000000}}, 0xa0) 02:00:25 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f00000001c0)='\'ppp0{wlanG\x92\x1a)Cr\xa1\x0f\xf10procvbox\x88et1&vmnet0\x00') 02:00:25 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000100000000000100000e22"], 0x0) 02:00:25 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000300000000000100000e22"], 0x0) 02:00:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x7d) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 793.537130][T27351] cgroup: Unknown subsys name ''ppp0{wlanG’)Cr¡ñ0procvboxˆet1&vmnet0' [ 793.575883][T27352] cgroup: Unknown subsys name ''ppp0{wlanG’)Cr¡ñ0procvboxˆet1&vmnet0' 02:00:25 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r6, 0x0, 0x0) getpgid(r6) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5e8c228f9e32f1d2febafdbe9fa8acecb35034167943189b0ff5aaed8f88ba37aa73ac2a69969d4af1d2d1f17736d464bdc031b236ca", @ANYRES16=r5, @ANYBLOB="000429bd7000fddbdf25030000004400038008000100010400000800010000000000080002000100000008000100030000000800020001000000080003000900000008000200ce87000008000100040000002000068008000100060000000400020008000100220e000008000100943300001c000980080001000400000008000100680400000800010004a12b47"], 0x94}}, 0x20008840) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d0, 0x138, 0x128, 0x128, 0x0, 0x0, 0x300, 0x290, 0x290, 0x300, 0x290, 0x3, 0x0, {[{{@uncond, 0x0, 0xd0, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x9, '\x00', 'syz0\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @remote}, [], [], 'ip_vti0\x00', 'bridge0\x00'}, 0x0, 0x160, 0x1c8, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty, @mcast2}}, @common=@unspec=@pkttype={{0x28, 'pkttype\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 02:00:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) dup(r2) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:25 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000500000000000100000e22"], 0x0) [ 793.706195][T27364] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 793.722114][T27366] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x85) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:25 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f00000001c0)='\'ppp0{wlanG\x92\x1a)Cr\xa1\x0f\xf10procvbox\x88et1&vmnet0\x00') 02:00:25 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000600000000000100000e22"], 0x0) 02:00:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0xa5) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:25 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f00000001c0)='\'ppp0{wlanG\x92\x1a)Cr\xa1\x0f\xf10procvbox\x88et1&vmnet0\x00') 02:00:25 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000700000000000100000e22"], 0x0) 02:00:25 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000000800000000000100000e22"], 0x0) 02:00:25 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f00000001c0)='\'ppp0{wlanG\x92\x1a)Cr\xa1\x0f\xf10procvbox\x88et1&vmnet0\x00') 02:00:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0xf0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:26 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000001100000000000100000e22"], 0x0) 02:00:26 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000002000000000000100000e22"], 0x0) 02:00:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x300) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:26 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000001c0)={r6}, 0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={r6, 0x5}, 0x8) write$sndseq(r3, &(0x7f0000000200)=[{0xff, 0x6, 0xf7, 0x0, @time={0x9, 0x3}, {0xc2, 0xff}, {0x3, 0x20}, @time=@time={0x0, 0x1}}, {0xf7, 0x9d, 0x5, 0x0, @tick, {0xfd, 0x7}, {0x4, 0x99}, @control={0x7, 0x10000, 0x4441}}, {0x8, 0x1, 0x6, 0x0, @time={0x1, 0x703}, {0x6, 0x99}, {0x40, 0x1f}, @quote={{0x1, 0x7a}, 0x2, &(0x7f00000001c0)={0x80, 0x5, 0xfb, 0x4, @time={0xfffffe00, 0xff}, {0x9, 0x1}, {0x7f, 0x62}, @time=@time={0x0, 0x7}}}}, {0x9, 0x40, 0x0, 0x20, @tick=0x7, {0x3, 0x4}, {0x9, 0x9}, @connect={{0x4, 0x4}, {0x7f, 0x3}}}, {0x0, 0x1, 0x1, 0x81, @time={0x6, 0x1f}, {0x3d, 0x4}, {0x9}, @raw8={"469346324c3f7af6f23e1ca3"}}, {0x6, 0x3f, 0x6, 0x40, @time={0x3dd, 0x101}, {0x3f, 0x6}, {0x40}, @raw8={"3190a51f547282be01dbda91"}}, {0x40, 0x7f, 0x8, 0x1, @time={0x7, 0x2}, {0xff, 0x1}, {0x9e, 0x30}, @connect={{0x6, 0x7}, {0x81, 0x5}}}], 0xc4) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x12000, 0x0) ioctl$BLKRAGET(r7, 0x1263, &(0x7f0000000140)) 02:00:26 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000003000000000000100000e22"], 0x0) 02:00:26 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:26 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000004000000000000100000e22"], 0x0) 02:00:26 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5800000002060300000000000000000009003a6e65742c696661636500000cf306800800000000000000050001000700001a39b4d10d00050005000200000000003600000000000000b49e027b6f9b2685000000000000e67600000000000000094c3247b74ffb0444def229849fa01a175a6846cc96a607c8992352567e"], 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) r3 = dup3(r1, r0, 0x80000) dup(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x80001, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000001c0)={r9}, 0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={r9, 0x7}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000100)={r10, 0x6}, 0x8) 02:00:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x364) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 794.592449][T27411] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 794.612805][T27413] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:26 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000000000000006000000000000100000e22"], 0x0) 02:00:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f0000000040)={0x6, 'dummy0\x00', {0x8}, 0x6}) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) dup(r5) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r5, 0x5386, &(0x7f00000001c0)) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup3(r11, r10, 0x0) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$KVM_CREATE_DEVICE(r9, 0xc00caee0, &(0x7f00000000c0)={0x2, r13, 0x1}) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'p\xaf\xc5\xf82\xea\xb7^\xac\xd8\x9a\x93pp0{wlan0p2ocvboxnet1&vmnet0\x00') 02:00:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) dup(r5) statx(r5, &(0x7f0000000140)='./file0\x00', 0x800, 0x10, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r7, 0xee00, 0x0) keyctl$chown(0x4, r7, 0x0, 0x0) r8 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$get_persistent(0x16, r6, r8) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000390400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b0001006272696467650000140d028005002b00000000000500160001000000"], 0x44}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup3(r10, r9, 0x0) dup(r11) ioctl$VIDIOC_SUBDEV_S_EDID(r11, 0xc0285629, &(0x7f0000000100)={0x0, 0x2, 0x1f, [], &(0x7f00000000c0)=0x1f}) 02:00:26 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff0200000000ffffff8d00000000000100000e22"], 0x0) 02:00:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313af026ca16b9669abd0f8323058da774c0f518d781a7a867", 0x81}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee2514903088dfd546a136d40646857b851b65a7a918c58881be75d5d71239c7698d7bdb3f879f49436bbbd87586553407860397d488", 0xe1}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8c50d06", 0x2e}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e", 0x88}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d461fd8e623ef4860aee8c34c32e6b311045684f83aae6d36aeb6430fcb2939da257013f35531", 0x89}, {&(0x7f00000019c0)="b65836c3d98df987e963b3f2c6cd9a05289662018771ef0319e3d867bbdf237a39faca25190ea708520ec42d202286b0e1971368ddbefe", 0x37}], 0x6}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f093e579a0ad13bbfa6dfcf5f92e9137fcecd3422187adb2613d1cb2a10ac11024822cad9f16a8b47c13f163ae0a1beeec0926acde4", 0x36}], 0x1}}], 0x2, 0x8804) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r4, 0x8983, &(0x7f0000000080)={0x8, 'bridge_slave_0\x00', {'syzkaller1\x00'}, 0x160}) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 02:00:26 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x10a) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x3, 0x7}, {0xaaf, 0x6}]}, 0x14, 0x2) 02:00:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x500) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:26 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x0) r0 = socket(0x11, 0x800000003, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SIOCRSACCEPT(r4, 0x89e3) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1, 0x4) fspick(r5, &(0x7f0000000140)='./file0\x00', 0x1) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x4}}]}, 0x30}}, 0x0) 02:00:26 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff0200000000fffffff500000000000100000e22"], 0x0) [ 795.012845][T27438] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 795.041225][T27443] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:26 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:26 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff0200000000000000ff00000000000100000e22"], 0x0) 02:00:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x600) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:27 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup(0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000080)={0x0, 0x80, 0x1c0, 0x913, 0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8400, 0x0) r3 = getpid() r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) dup2(0xffffffffffffffff, 0xffffffffffffffff) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r2, 0x10001) r5 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0x7fff, 0x200, 0x0, 0x1, 0x18, "9618b206a4b661b5"}) 02:00:27 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff0200000000ffffffff00000000000100000e22"], 0x0) [ 795.209224][T27452] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:27 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x1080011, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:27 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x60, 0x13, 0x10, 0x70bd2d, 0x0, {0x1, 0xf8, 0x78, 0x8, {0x4e22, 0x4e22, [0x4, 0x0, 0x9, 0x800], [0x3, 0xff, 0x4, 0x6], r1, [0x200, 0x1ff]}, 0x6, 0xffffc1d5}, [@INET_DIAG_REQ_BYTECODE={0x14, 0x1, "35aa9261bf2c2e6af06e8111e7e0bca6"}]}, 0x60}, 0x1, 0x0, 0x0, 0x8094}, 0x4) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000300)={0x0, 0xff}) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7, 0x708c1) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x9, 0xa, 0x4, 0x800, 0x3, {r4, r5/1000+60000}, {0x3, 0x0, 0x40, 0xfa, 0x6, 0x6, "ee503275"}, 0x8, 0x4, @offset=0x8f7, 0x8001, 0x0, 0xffffffffffffffff}) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000200)=r6) r7 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200]}, 0x45c) r8 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 02:00:27 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02ffffffffffffffff00000000000100000e22"], 0x0) 02:00:27 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000300000000000000000000000100000e22"], 0x0) 02:00:27 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "ff18fd8aab83abe1", "cf39a00884bf2ca010761c0c23820a1270bc100c6d8bd760ce5f2352c5703a6a", "e22b963d", "3102a288c342a6a3"}, 0x38) perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0xffffffffffffffff, 0x6c}, &(0x7f0000001fee)='R\x05rist\xe3cusgrVid:De', 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0x0, 0x16, &(0x7f00000000c0)) ptrace$getregset(0x4205, r0, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000300)={'veth1\x00', 0x0}) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000740)='./file0\x00', 0x100) 02:00:27 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f00000001c0)={0xfffffff9, 0x6, 0x1}) 02:00:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x700) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:27 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000500000000000000000000000100000e22"], 0x0) 02:00:27 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000600000000000000000000000100000e22"], 0x0) [ 795.614913][T27480] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 795.644815][T27485] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:27 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000700000000000000000000000100000e22"], 0x0) 02:00:27 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000800000000000000000000000100000e22"], 0x0) 02:00:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x900) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:27 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02001100000000000000000000000100000e22"], 0x0) 02:00:27 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02003000000000000000000000000100000e22"], 0x0) 02:00:27 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100636273001c000200180001"], 0x48}}, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket(0x10, 0x3, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="55cba51aea1c39e72dc0dfff4001000000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100636273001c000200180001"], 0x48}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000001b98ce21870d6138000000"], 0x48}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x411, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x6841}}, 0x20}}, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f00000001c0)="3c3724510ae79b2891f1e6a34826e8af89d3c20afd4106dc6739334f5d22d4811cd57bbcebcba688b58fbf555798829aea9818c4a6200871faf8a211c9cd66e8c85ef5e25d1e03d889bbc65bb72a62b71f03bf43ea8745e8b87eb1ba2437e1b48cbe177eb72eed634930d439941825c1d1eb03603d58988c2e02e62e6b0c99f5cd9f68f0", 0x84}, {&(0x7f0000000040)="8d6db2a48a25e4c403ff91db006d65b353076b3f77fbfd4a8a1a60683080cd2a82d3723cc7843b335c19fe01c6f4d5bd89b0615278e40253d3574101bbb48a61f92ad83c5a7def04ae3b2aa47d42ff6750de", 0x52}], 0x2}}, {{&(0x7f00000002c0)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000001580)=[{&(0x7f0000000300)="f26d6fea0dcd57da22f108c67cdd0c1215a57650415a0932c33fddc9801d1d2bb16c1bb69d09629cbbbb1d4d9268bd14d1abc8997bd152fc4f512efea2c3c16736fd3720a720ac17e4d2c8d68d6a37107fdd548f1523e84787af2d7a34b9d8165875d13d4cc16bd2ae39c54ca231d167c0cefc85", 0x74}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="6d7baffa2cd3894178d0e6e810e1851a8c6ac33e77ec3beb0337661d327c0792a33cbbdab5e503f5bb966759d5e795116f441638754c45d1d2d2afb977b42d13ecb724df", 0x44}, {&(0x7f0000001400)="4c9329ae59c7269e97a351b11540a9698ac3db1f323a3710a4853f46fc4eb5f4f95f64beece4c908e346dad73e1fc76a0d9b95d8907e48337c7bd342d14c815dbc3433e1a9f17ed4cdd25c552e6299e218b122a24618d687feffa430148c4d9a48b09ee3a7a14b0da2eca445f10a8e119ef67c2519dab88d40a5d360dd9b463cd63cf28eb2034075646225f77f8e39494cbe6d43087f063d600e26b3923b09e397aa4258c9026471e754788199472a5971543d82da244416a3c433ceca4d617509a64a5b6f110385145f3aa5c4d4680cfa88e0c3b138efda30b07705a6774ed3d9e8ca0a60bdb8f697024cff3be9993a56", 0xf1}, {&(0x7f0000001500)="81ce473ade138a30d8fd51708bc37cd4425243ba25bd1efa66b95541f5f18db3fe6afdc9b36ff0d85ef756", 0x2b}, {&(0x7f0000001540)="75a59cafe9b625c7109c745673c8aa6766726d495c25178a", 0x18}], 0x6, &(0x7f00000017c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @multicast2}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @empty}}}], 0x60}}, {{&(0x7f0000001840)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000001b80)=[{&(0x7f0000001880)="2f4c24e9e400bf7fadc5a5dc843d7ad304cee6e737e84bf3c98e7ab228ed2c2725cca9f163f1a35e2013e92ba0806330670522f1ffc7d9b077029b7e6f3351ac60c8af33", 0x44}, {&(0x7f0000001900)="e651578066f6d80fd8376b8c9850c59dc069aefc8370084d1ee8ce381a9673cea5ddd917c1eeeb3e7ca0373157ee89a67991d3b3bb5761bdea73a6804cdae41441e4335374d609170588f4c810757190ab0dd6f2f12ac443d8f833223c150da8af658bf949625ecc9fe802ec47b61427cddd368758de2ee3c2ed2bd5fa2dffe184d80029bb1c8f8d5a1aff45c4430dce11a9ad2204369b75", 0x98}, {&(0x7f00000019c0)="695cc3787c7031280a1257158871dd257b37ee3af5c709390daf22599131d66ddbea24ddc3eee80a7bf2f4692655e3530463b3f2451a73ce6c6056cc82e5dfd2db830d2c45926ac293b6345064cccee594e82ea9228ce5e62ddcc6ea2c48df9348dcdbdfaee6a12756881594c84c75901e1355f8a35deaff3efb4983a265125ae282b379bf5f3edb620b883ba1c8a1e97c3cabb44f", 0x95}, {&(0x7f0000001a80)="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", 0xfa}], 0x4, &(0x7f0000001bc0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}], 0x68}}, {{&(0x7f0000001c40)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c80)="30a3e73dd4", 0x5}, {&(0x7f0000001600)="626a7417e6c73b1f8762b636fecf77e53fbdf48d437467166a0c80fa38220117c2c1d3766e2061ef3dabaa86f44fada5d2fa83beba5d1354405c9cb8e945343377bd1957a452deed06adf06dc243c3fbc1c272c1d8e68c04f080b88c1663b73c8e6b25c2e9ee7791864eb42f8cc6a8422f474b59c068", 0x76}], 0x2, &(0x7f0000001d40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @loopback}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @local, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_retopts={{0x98, 0x0, 0x7, {[@timestamp={0x44, 0x20, 0xc3, 0x0, 0x6, [0x3, 0x7fffffff, 0x8001, 0x5, 0x1, 0x10001, 0x3]}, @end, @rr={0x7, 0xb, 0x82, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2]}, @cipso={0x86, 0x59, 0x3, [{0x2, 0x8, "c8cf681a8fa6"}, {0x7, 0x11, "d5ed1b66efe912df8a842cf04aaa44"}, {0x6, 0x11, "83c01ff7ab615436d02fa1103309d6"}, {0x2, 0x12, "8917a8cee0fd4dbc0cce57825d1c7b1a"}, {0x0, 0xa, "055b9ae0ba9daf3d"}, {0x0, 0xd, "4225544c768140f05da2d7"}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x120}}], 0x4, 0x80) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:27 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000140)='./bus\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x800010, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x1000) open(0x0, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r4) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000740)="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", 0x1000}, {&(0x7f00000000c0)="1f5626737d48df7ebc7229b87649d6da5ecf6fa1b201e9094bac573e98e2a9f3b1924643e7beb6497169ec57c1436c605a71cabcbedd56df88c304fa20", 0x3d}, {&(0x7f00000001c0)="b048082ce50695c94e3db5ba802694032b324005cc76b67fad24c86f6523cae63e47fe895f475ba765295fb640f0e0d25b54192632c1585e9f8939811939a43329b10414bd1cbaa671115c408497699d58257ef477b8c810c717bf524fa7cc0010a4de8c3c667d1e65add5466433ab5a7783d90595e31aa2f1254c9b2bf692522aa377b82e91a84b79e059cd0385e095d8191f329ca14103942300a04b7f934faf6813e20892a5", 0xa7}, {&(0x7f0000000380)="544e1b65378bfef5831dba06999f1fd97c7432b962aefa534194d305d56fd70e5984ff402b501052f61ee31aa06b3f552ec536c93c48d7aa0bd7181ac046146380ec1e7b565ad0f78953ecff36c6b52a586ec06bc71048475b348305f9ec6b96e10325d689350d19630662fa5db2b0c189056267faef626ef927c671fbf19e6cc9b6e2e53a742d901abd9ba4d227f0a0b17635c4feac299a590d00bd6dd80e1b8d86e84c", 0xa4}, {&(0x7f0000000440)="f05ac0da2939e344ab4ee19ae239ee0821120b5f1f7767120fd6cf2658a8399fc627027884059a4535ec662e450bc9df44454e80be9e58b63352a717bac6886c74c4fa2f8e7e210294f4dc1132a7ee7ab0090c5417640d6eabd258c7a818500a112a19a31d9471b8deed39226fcdadf0773f1f72c5a9fa5b9e7a766b5a3793d151c7712b4f3cc81be5928bed909dba6b54fe81ee636b32e84f3159e9ce34a1afe1f25bdaae9e936a", 0xa8}], 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000200000000000000000000010000000100000028540000000103000000000f00000000", @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00'], 0x78}, 0xc000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) [ 796.053798][T27505] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:27 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02006000000000000000000000000100000e22"], 0x0) 02:00:27 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f00000001c0)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) r6 = dup3(r1, r0, 0x0) dup(r6) ioctl$TIOCGPTPEER(r6, 0x5441, 0x0) 02:00:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0xa00) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:28 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000003000000000000000000000100000e22"], 0x0) 02:00:28 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f00000001c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000680)=""/76, 0x4c, 0x40003022, &(0x7f0000000780)={0xa, 0x0, 0x0, @loopback}, 0x1c) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYRES16], 0x2}}, 0x0) sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="7b728f7a49dafd2bb96559ea2dd5fa2334e22a3ce89a2a46a74f6e223561292d6e4a5e4e0143bafa5edb5bb8a45de43a95364892492ccf1b79b56a9541f96b4b6b0d57783fe7cb9ba50de5a91e514d4850e64e60a2fd7848bd27a09b084025", @ANYRESDEC, @ANYBLOB="000100000c00b700ff030000020000000c0099000600aaaaaaaaaa2b000014001a00aaaaaaaaaabb00"/64], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x44880) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400600) ioctl$SNDCTL_DSP_SETFMT(0xffffffffffffffff, 0xc0045005, &(0x7f0000000040)=0x80) [ 796.193474][T27515] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' [ 796.241046][T27519] cgroup: Unknown subsys name ''ppp0{wlan0procvboxnet1&vmnet0' 02:00:28 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, &(0x7f0000000180)='\'ppp0{wlan0procvboxnet1&vmnet0\x00') 02:00:28 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000005000000000000000000000100000e22"], 0x0) 02:00:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)={{0x0, 0x0, @descriptor="93bfc15fb1fcb9cf"}}) syz_open_procfs(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000010600000000000000000a20000000000a010000000000040000000000000f0900010073797a300000000070000000120a01"], 0xb8}}, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000580)={0x0, 0x60, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0xb00) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 02:00:28 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaec93c200000086dd6026f52600081100fe7e00ffffffe80000000000000000bbff02000006000000000000000000000100000e22"], 0x0) 02:00:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x7, 0xffffffffffffffff, 0x793df5def7d7035f) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mq_unlink(0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, 0x0, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) r1 = add_key$keyring(0x0, &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r5, 0xc0305710, &(0x7f0000000000)={0x1, 0x8, 0x6, 0x1}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000180)=0xc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000001480)={0x146c, 0x10, 0x400, 0x70bd25, 0x25dfdbfb, {0x16}, [@generic="0fbda1d4ce1b99b475cc7d922c26e85b294c493a062691b407855b42b959bb4e424b3c7aac8f839fb5bdbe3a615ad88585057ec2eb5e2dfd67c6641854303238a6bf950c96094e919b5216a6ac7ed503895f17531da039a026aff6047fd580e76e